Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-2672 (GCVE-0-2009-2672)
Vulnerability from cvelistv5 – Published: 2009-08-05 19:00 – Updated: 2024-08-07 05:59- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T05:59:56.979Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2009:1200",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html"
},
{
"name": "RHSA-2009:1199",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html"
},
{
"name": "ADV-2009-2543",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/2543"
},
{
"name": "37460",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37460"
},
{
"name": "GLSA-200911-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200911-02.xml"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "HPSBUX02476",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"name": "36199",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36199"
},
{
"name": "36248",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36248"
},
{
"name": "oval:org.mitre.oval:def:7723",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7723"
},
{
"name": "SSRT090250",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://java.sun.com/javase/6/webnotes/6u15.html"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "TA09-294A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"name": "35943",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/35943"
},
{
"name": "oval:org.mitre.oval:def:9359",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9359"
},
{
"name": "36180",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36180"
},
{
"name": "sun-jre-proxy-session-hijacking(52337)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52337"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
},
{
"name": "263409",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT",
"x_transferred"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1"
},
{
"name": "36176",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36176"
},
{
"name": "1022659",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1022659"
},
{
"name": "SUSE-SR:2009:016",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html"
},
{
"name": "37300",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37300"
},
{
"name": "APPLE-SA-2009-09-03-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
},
{
"name": "SUSE-SA:2009:053",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
},
{
"name": "RHSA-2009:1201",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html"
},
{
"name": "SUSE-SA:2009:043",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html"
},
{
"name": "37386",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37386"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20"
},
{
"name": "ADV-2009-3316",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3316"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-08-04T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-10T18:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "RHSA-2009:1200",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html"
},
{
"name": "RHSA-2009:1199",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html"
},
{
"name": "ADV-2009-2543",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/2543"
},
{
"name": "37460",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37460"
},
{
"name": "GLSA-200911-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200911-02.xml"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "HPSBUX02476",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"name": "36199",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36199"
},
{
"name": "36248",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36248"
},
{
"name": "oval:org.mitre.oval:def:7723",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7723"
},
{
"name": "SSRT090250",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://java.sun.com/javase/6/webnotes/6u15.html"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "TA09-294A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"name": "35943",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/35943"
},
{
"name": "oval:org.mitre.oval:def:9359",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9359"
},
{
"name": "36180",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36180"
},
{
"name": "sun-jre-proxy-session-hijacking(52337)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52337"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
},
{
"name": "263409",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1"
},
{
"name": "36176",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36176"
},
{
"name": "1022659",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1022659"
},
{
"name": "SUSE-SR:2009:016",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html"
},
{
"name": "37300",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37300"
},
{
"name": "APPLE-SA-2009-09-03-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
},
{
"name": "SUSE-SA:2009:053",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
},
{
"name": "RHSA-2009:1201",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html"
},
{
"name": "SUSE-SA:2009:043",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html"
},
{
"name": "37386",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37386"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20"
},
{
"name": "ADV-2009-3316",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3316"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-2672",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2009:1200",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html"
},
{
"name": "RHSA-2009:1199",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html"
},
{
"name": "ADV-2009-2543",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/2543"
},
{
"name": "37460",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37460"
},
{
"name": "GLSA-200911-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200911-02.xml"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "HPSBUX02476",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"name": "36199",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36199"
},
{
"name": "36248",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36248"
},
{
"name": "oval:org.mitre.oval:def:7723",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7723"
},
{
"name": "SSRT090250",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"name": "http://java.sun.com/javase/6/webnotes/6u15.html",
"refsource": "CONFIRM",
"url": "http://java.sun.com/javase/6/webnotes/6u15.html"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "TA09-294A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"name": "35943",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35943"
},
{
"name": "oval:org.mitre.oval:def:9359",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9359"
},
{
"name": "36180",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36180"
},
{
"name": "sun-jre-proxy-session-hijacking(52337)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52337"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
},
{
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1",
"refsource": "CONFIRM",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
},
{
"name": "263409",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1"
},
{
"name": "36176",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36176"
},
{
"name": "1022659",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022659"
},
{
"name": "SUSE-SR:2009:016",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html"
},
{
"name": "37300",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37300"
},
{
"name": "APPLE-SA-2009-09-03-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
},
{
"name": "SUSE-SA:2009:053",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
},
{
"name": "RHSA-2009:1201",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html"
},
{
"name": "SUSE-SA:2009:043",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html"
},
{
"name": "37386",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37386"
},
{
"name": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20",
"refsource": "CONFIRM",
"url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20"
},
{
"name": "ADV-2009-3316",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3316"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-2672",
"datePublished": "2009-08-05T19:00:00.000Z",
"dateReserved": "2009-08-05T00:00:00.000Z",
"dateUpdated": "2024-08-07T05:59:56.979Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:*:update_13:*:*:*:*:*:*\", \"versionEndIncluding\": \"6\", \"matchCriteriaId\": \"E6AF4AEB-CB27-4AAB-B4A9-CC65EC831D77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BB00A29-FEBB-4139-9E96-691EC1410EFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD8CC179-F76E-4CC2-9CBD-69CBBA5BD532\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2DC7389-9697-4EF0-9C4E-153731CDD75D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5F476C8-5466-4E6B-B73B-4ACFBB02AD5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8C7C8C1-AA0D-4BD9-A8EC-85BBE627DE13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*\", \"matchCriteriaId\": \"BAF0844B-ECB1-4AF0-AA32-1B8789AC5042\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EFEB813-B20D-4C8B-922D-0603CB93F72A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:5.0:update_16:*:*:*:*:*:*\", \"matchCriteriaId\": \"41CE5B2D-5594-4026-BABF-CBE485764D8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:5.0:update_17:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFB84BBA-D93E-4517-BA7A-FCFB860736CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"25322D24-C5D9-43A6-87CC-1BF7FA6A3E76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"400FDCDE-16DE-4BD6-81E2-4A5DA12E99CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*\", \"matchCriteriaId\": \"82C49C78-ACE3-407D-AE21-EA180633C437\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F91F8A2-D473-48DC-81DA-21291DE7B6E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E46B3B4-9E1C-4C87-A4CD-C4CE7FBCA7F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F69C703-8541-4AA8-A66A-0292E0FCB749\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*\", \"matchCriteriaId\": \"99E08AB2-49AD-42C6-967F-773F2C6E188A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*\", \"matchCriteriaId\": \"9459F130-A3DD-4A4E-9582-4FB82619EB5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C9F6EA8-6A88-4485-89A3-0FDF84AB51DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:6:update_10:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7680A8A-EC07-4819-A93C-B8EBF8B1199F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:6:update_11:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA89349B-834C-42D0-84C6-CA73CE1F8B26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:6:update_12:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7865369-9DE6-4C20-ACD2-CCC14ED54701\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"67E0818A-3675-4293-89FE-5001E36C0F38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"95112B98-B6B2-43FA-BF76-F518649CF3BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A18341A-3688-48E7-95AD-283EC9C95B4A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*\", \"matchCriteriaId\": \"E301C59A-47F5-4861-9091-D0002CBA5B7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:6:update_6:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCD4F889-710C-43C5-85DD-70E96F8FE313\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:6:update_7:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED195051-AAC7-4EE1-B936-18D1C8AD2498\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:6:update_8:*:*:*:*:*:*\", \"matchCriteriaId\": \"44146DF6-F368-4F17-B379-34194873D80F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:6:update_9:*:*:*:*:*:*\", \"matchCriteriaId\": \"18B70D77-F631-47D8-95A5-1D3A7E8BF63B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:*:update_13:*:*:*:*:*:*\", \"versionEndIncluding\": \"6\", \"matchCriteriaId\": \"C150A6B7-9C4C-46E4-99B6-792A0D326E84\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A2379FC-BC33-4C90-97DD-ED3723172008\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*\", \"matchCriteriaId\": \"86A1256D-7A34-4FDD-9536-82FD6497A712\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BB5E47A-8C17-4995-9EF8-01BFA0B702B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*\", \"matchCriteriaId\": \"9300FA38-C234-4BD8-ADB6-D2A29EBA81DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*\", \"matchCriteriaId\": \"C87F6EE3-F66B-4F15-89BA-26A4D3AD2556\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*\", \"matchCriteriaId\": \"56F0F497-6586-408B-80AF-6BC2B9909397\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:5.0:update_15:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E022C6E-20DE-4124-9CA3-11400E13A05A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:5.0:update_16:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A34B1CB-EE08-48BB-BEC1-0720801DA0D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:5.0:update_17:*:*:*:*:*:*\", \"matchCriteriaId\": \"57E2C9F7-ACD1-4A89-AB18-ADF595995772\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:5.0:update_19:*:*:*:*:*:*\", \"matchCriteriaId\": \"89041A24-8354-410B-8026-875CC1791565\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D594E269-D722-45FC-B390-B0D38ADEC923\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CAA89D6-651A-4B8C-A134-C3A2CB84002A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*\", \"matchCriteriaId\": \"B930EAFB-F2E6-4FCA-A21B-022656396A2C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B20EB5F-D12A-4267-9887-C39A188EB9AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*\", \"matchCriteriaId\": \"52347FDC-9983-4A64-8031-B4A50DDC9BBB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*\", \"matchCriteriaId\": \"C95654B3-ACA0-4B0D-9F31-B9C5FB7B9C96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*\", \"matchCriteriaId\": \"8387A041-582A-4010-9C44-672090F41A72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1F2D335-CDDF-4D2E-80CA-F1A0AF92501A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F98D2BD-2AC1-4C4C-8A10-71093DCBC4E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:6:update_10:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D6FCAFC-F41C-4C6F-9EA4-46AEFF65CC5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:6:update_11:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BA9E6CD-F43F-487D-9638-406B72D51471\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:6:update_12:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D2F4664-E158-45ED-81B6-D8371F1C6B9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDC09958-5286-4C16-AB6F-63B4BDD902B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDE1E9E9-85EF-4ACA-902B-00225EB4324F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0CDBFCB-42EA-4F19-A98D-7696B0D526CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*\", \"matchCriteriaId\": \"53DCFF2A-77A7-41DB-A712-9B6D1FD2574A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:6:update_6:*:*:*:*:*:*\", \"matchCriteriaId\": \"82C6F76F-68FD-4794-9182-935D85910C1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:6:update_7:*:*:*:*:*:*\", \"matchCriteriaId\": \"6314C9DF-9421-445D-ABCC-79EDCED23156\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:6:update_8:*:*:*:*:*:*\", \"matchCriteriaId\": \"533670FA-B8DC-40B4-ADC1-CCD70E4A43A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:6:update_9:*:*:*:*:*:*\", \"matchCriteriaId\": \"119B72FA-8B85-4D1F-8A14-5B07204DAED5\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.\"}, {\"lang\": \"es\", \"value\": \"El mecanismo proxy implementado en Sun Java Runtime Environment (JRE) en JDK y JRE v6 anterior Update v15, y JDK y JRE v5.0 anterior Update v20, no previene el acceso a las cookies del buscador por (1) applets y (2) aplicaciones Java Web Start no confiables, que permiten a atacantes remotos secuestrar las sesiones web a trav\\u00e9s de vectores no especificados.\"}]",
"id": "CVE-2009-2672",
"lastModified": "2024-11-21T01:05:27.723",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": true, \"userInteractionRequired\": false}]}",
"published": "2009-08-05T19:30:01.217",
"references": "[{\"url\": \"http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://java.sun.com/javase/6/webnotes/6u15.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/36176\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/36180\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/36199\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/36248\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/37300\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/37386\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/37460\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200911-02.xml\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/507985/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/35943\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1022659\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA09-294A.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/2543\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3316\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/52337\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7723\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9359\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1199.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1200.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1201.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://java.sun.com/javase/6/webnotes/6u15.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/36176\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/36180\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/36199\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/36248\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/37300\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/37386\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/37460\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200911-02.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/507985/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/35943\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1022659\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA09-294A.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/2543\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3316\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/52337\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7723\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9359\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1199.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1200.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1201.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2009-2672\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-08-05T19:30:01.217\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"El mecanismo proxy implementado en Sun Java Runtime Environment (JRE) en JDK y JRE v6 anterior Update v15, y JDK y JRE v5.0 anterior Update v20, no previene el acceso a las cookies del buscador por (1) applets y (2) aplicaciones Java Web Start no confiables, que permiten a atacantes remotos secuestrar las sesiones web a trav\u00e9s de vectores no especificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:*:update_13:*:*:*:*:*:*\",\"versionEndIncluding\":\"6\",\"matchCriteriaId\":\"E6AF4AEB-CB27-4AAB-B4A9-CC65EC831D77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BB00A29-FEBB-4139-9E96-691EC1410EFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD8CC179-F76E-4CC2-9CBD-69CBBA5BD532\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2DC7389-9697-4EF0-9C4E-153731CDD75D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5F476C8-5466-4E6B-B73B-4ACFBB02AD5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8C7C8C1-AA0D-4BD9-A8EC-85BBE627DE13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAF0844B-ECB1-4AF0-AA32-1B8789AC5042\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EFEB813-B20D-4C8B-922D-0603CB93F72A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_16:*:*:*:*:*:*\",\"matchCriteriaId\":\"41CE5B2D-5594-4026-BABF-CBE485764D8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_17:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFB84BBA-D93E-4517-BA7A-FCFB860736CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"25322D24-C5D9-43A6-87CC-1BF7FA6A3E76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"400FDCDE-16DE-4BD6-81E2-4A5DA12E99CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"82C49C78-ACE3-407D-AE21-EA180633C437\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F91F8A2-D473-48DC-81DA-21291DE7B6E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E46B3B4-9E1C-4C87-A4CD-C4CE7FBCA7F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F69C703-8541-4AA8-A66A-0292E0FCB749\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*\",\"matchCriteriaId\":\"99E08AB2-49AD-42C6-967F-773F2C6E188A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*\",\"matchCriteriaId\":\"9459F130-A3DD-4A4E-9582-4FB82619EB5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C9F6EA8-6A88-4485-89A3-0FDF84AB51DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:6:update_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7680A8A-EC07-4819-A93C-B8EBF8B1199F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:6:update_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA89349B-834C-42D0-84C6-CA73CE1F8B26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:6:update_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7865369-9DE6-4C20-ACD2-CCC14ED54701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"67E0818A-3675-4293-89FE-5001E36C0F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"95112B98-B6B2-43FA-BF76-F518649CF3BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A18341A-3688-48E7-95AD-283EC9C95B4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"E301C59A-47F5-4861-9091-D0002CBA5B7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:6:update_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCD4F889-710C-43C5-85DD-70E96F8FE313\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:6:update_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED195051-AAC7-4EE1-B936-18D1C8AD2498\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:6:update_8:*:*:*:*:*:*\",\"matchCriteriaId\":\"44146DF6-F368-4F17-B379-34194873D80F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:6:update_9:*:*:*:*:*:*\",\"matchCriteriaId\":\"18B70D77-F631-47D8-95A5-1D3A7E8BF63B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:*:update_13:*:*:*:*:*:*\",\"versionEndIncluding\":\"6\",\"matchCriteriaId\":\"C150A6B7-9C4C-46E4-99B6-792A0D326E84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A2379FC-BC33-4C90-97DD-ED3723172008\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"86A1256D-7A34-4FDD-9536-82FD6497A712\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BB5E47A-8C17-4995-9EF8-01BFA0B702B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"9300FA38-C234-4BD8-ADB6-D2A29EBA81DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*\",\"matchCriteriaId\":\"C87F6EE3-F66B-4F15-89BA-26A4D3AD2556\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*\",\"matchCriteriaId\":\"56F0F497-6586-408B-80AF-6BC2B9909397\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_15:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E022C6E-20DE-4124-9CA3-11400E13A05A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_16:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A34B1CB-EE08-48BB-BEC1-0720801DA0D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_17:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E2C9F7-ACD1-4A89-AB18-ADF595995772\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_19:*:*:*:*:*:*\",\"matchCriteriaId\":\"89041A24-8354-410B-8026-875CC1791565\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D594E269-D722-45FC-B390-B0D38ADEC923\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CAA89D6-651A-4B8C-A134-C3A2CB84002A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B930EAFB-F2E6-4FCA-A21B-022656396A2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B20EB5F-D12A-4267-9887-C39A188EB9AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"52347FDC-9983-4A64-8031-B4A50DDC9BBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"C95654B3-ACA0-4B0D-9F31-B9C5FB7B9C96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*\",\"matchCriteriaId\":\"8387A041-582A-4010-9C44-672090F41A72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1F2D335-CDDF-4D2E-80CA-F1A0AF92501A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F98D2BD-2AC1-4C4C-8A10-71093DCBC4E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:6:update_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D6FCAFC-F41C-4C6F-9EA4-46AEFF65CC5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:6:update_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BA9E6CD-F43F-487D-9638-406B72D51471\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:6:update_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D2F4664-E158-45ED-81B6-D8371F1C6B9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDC09958-5286-4C16-AB6F-63B4BDD902B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE1E9E9-85EF-4ACA-902B-00225EB4324F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0CDBFCB-42EA-4F19-A98D-7696B0D526CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"53DCFF2A-77A7-41DB-A712-9B6D1FD2574A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:6:update_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"82C6F76F-68FD-4794-9182-935D85910C1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:6:update_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"6314C9DF-9421-445D-ABCC-79EDCED23156\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:6:update_8:*:*:*:*:*:*\",\"matchCriteriaId\":\"533670FA-B8DC-40B4-ADC1-CCD70E4A43A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:6:update_9:*:*:*:*:*:*\",\"matchCriteriaId\":\"119B72FA-8B85-4D1F-8A14-5B07204DAED5\"}]}]}],\"references\":[{\"url\":\"http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://java.sun.com/javase/6/webnotes/6u15.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/36176\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/36180\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/36199\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/36248\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/37300\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/37386\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/37460\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200911-02.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/35943\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1022659\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-294A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/2543\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/52337\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7723\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9359\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1199.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1200.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1201.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://java.sun.com/javase/6/webnotes/6u15.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36180\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36199\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36248\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37300\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37386\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37460\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200911-02.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/35943\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1022659\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-294A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/2543\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/52337\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7723\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9359\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1199.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1200.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1201.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
RHSA-2009_1200
Vulnerability from csaf_redhat - Published: 2009-08-06 20:41 - Updated: 2024-11-14 10:46The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.
The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.
The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.
The plugin functionality in Sun Java SE 6 before Update 15 does not properly implement version selection, which allows context-dependent attackers to leverage vulnerabilities in "old zip and certificate handling" and have unspecified other impact via unknown vectors.
The Abstract Window Toolkit (AWT) implementation in Sun Java SE 6 before Update 15 on X11 does not impose the intended constraint on distance from the window border to the Security Warning Icon, which makes it easier for context-dependent attackers to trick a user into interacting unsafely with an untrusted applet.
The Java Web Start implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException) via a crafted .jnlp file, as demonstrated by the jnlp_file/appletDesc/index.html#misc test in the Technology Compatibility Kit (TCK) for the Java Network Launching Protocol (JNLP).
Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-sun packages that correct several security issues are\nnow available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and\nthe Sun Java 6 Software Development Kit.\n\nThis update fixes several vulnerabilities in the Sun Java 6 Runtime\nEnvironment and the Sun Java 6 Software Development Kit. These\nvulnerabilities are summarized on the \"Advance notification of Security\nUpdates for Java SE\" page from Sun Microsystems, listed in the References\nsection. (CVE-2009-0217, CVE-2009-2475, CVE-2009-2476, CVE-2009-2625,\nCVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2674,\nCVE-2009-2675, CVE-2009-2676, CVE-2009-2690)\n\nUsers of java-1.6.0-sun should upgrade to these updated packages, which\ncorrect these issues. All running instances of Sun Java must be restarted\nfor the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1200",
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5",
"url": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5"
},
{
"category": "external",
"summary": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "513220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220"
},
{
"category": "external",
"summary": "513223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223"
},
{
"category": "external",
"summary": "515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1200.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-sun security update",
"tracking": {
"current_release_date": "2024-11-14T10:46:51+00:00",
"generator": {
"date": "2024-11-14T10:46:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2009:1200",
"initial_release_date": "2009-08-06T20:41:00+00:00",
"revision_history": [
{
"date": "2009-08-06T20:41:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-06T16:41:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T10:46:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i586"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-2475",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513215"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2475"
},
{
"category": "external",
"summary": "RHBZ#513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2475",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2475"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)"
},
{
"cve": "CVE-2009-2476",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513220"
}
],
"notes": [
{
"category": "description",
"text": "The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK OpenType checks can be bypassed (6736293)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2476"
},
{
"category": "external",
"summary": "RHBZ#513220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2476"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK OpenType checks can be bypassed (6736293)"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2674",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512915"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer JPEG processing integer overflow (6823373)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2674"
},
{
"category": "external",
"summary": "RHBZ#512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2674",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer JPEG processing integer overflow (6823373)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
},
{
"cve": "CVE-2009-2676",
"discovery_date": "2009-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515890"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE applet launcher vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2676"
},
{
"category": "external",
"summary": "RHBZ#515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JRE applet launcher vulnerability"
},
{
"cve": "CVE-2009-2690",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513223"
}
],
"notes": [
{
"category": "description",
"text": "The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK private variable information disclosure (6777487)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2690"
},
{
"category": "external",
"summary": "RHBZ#513223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2690",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2690"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK private variable information disclosure (6777487)"
},
{
"cve": "CVE-2009-2716",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516812"
}
],
"notes": [
{
"category": "description",
"text": "The plugin functionality in Sun Java SE 6 before Update 15 does not properly implement version selection, which allows context-dependent attackers to leverage vulnerabilities in \"old zip and certificate handling\" and have unspecified other impact via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK improper version selection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2716"
},
{
"category": "external",
"summary": "RHBZ#516812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516812"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2716"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK improper version selection"
},
{
"cve": "CVE-2009-2718",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516815"
}
],
"notes": [
{
"category": "description",
"text": "The Abstract Window Toolkit (AWT) implementation in Sun Java SE 6 before Update 15 on X11 does not impose the intended constraint on distance from the window border to the Security Warning Icon, which makes it easier for context-dependent attackers to trick a user into interacting unsafely with an untrusted applet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK reposition of untrusted applet security icon in X11",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2718"
},
{
"category": "external",
"summary": "RHBZ#516815",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516815"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2718",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2718"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK reposition of untrusted applet security icon in X11"
},
{
"cve": "CVE-2009-2719",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516820"
}
],
"notes": [
{
"category": "description",
"text": "The Java Web Start implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException) via a crafted .jnlp file, as demonstrated by the jnlp_file/appletDesc/index.html#misc test in the Technology Compatibility Kit (TCK) for the Java Network Launching Protocol (JNLP).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK DoS with crafted .jnlp file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2719"
},
{
"category": "external",
"summary": "RHBZ#516820",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516820"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2719"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK DoS with crafted .jnlp file"
},
{
"cve": "CVE-2009-2720",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516823"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK DoS with Swing Synthcontext implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2720"
},
{
"category": "external",
"summary": "RHBZ#516823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2720"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK DoS with Swing Synthcontext implementation"
}
]
}
RHSA-2009:1199
Vulnerability from csaf_redhat - Published: 2009-08-06 20:38 - Updated: 2026-03-13 01:03Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.
Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.
JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.
Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors.
Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6406003.
Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6429594. NOTE: this issue exists because of an incorrect fix for BugId 6406003.
Unspecified vulnerability in deserialization in the Provider class in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, aka BugId 6444262.
Race condition in the java.lang package in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, related to a "3Y Race condition in reflection checks."
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.5.0-sun packages that correct several security issues are\nnow available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Sun 1.5.0 Java release includes the Sun Java 5 Runtime Environment and\nthe Sun Java 5 Software Development Kit.\n\nThis update fixes several vulnerabilities in the Sun Java 5 Runtime\nEnvironment and the Sun Java 5 Software Development Kit. These\nvulnerabilities are summarized on the \"Advance notification of Security\nUpdates for Java SE\" page from Sun Microsystems, listed in the References\nsection. (CVE-2009-2475, CVE-2009-2625, CVE-2009-2670, CVE-2009-2671,\nCVE-2009-2672, CVE-2009-2673, CVE-2009-2675, CVE-2009-2676, CVE-2009-2689)\n\nUsers of java-1.5.0-sun should upgrade to these updated packages, which\ncorrect these issues. All running instances of Sun Java must be restarted\nfor the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1199",
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5",
"url": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5"
},
{
"category": "external",
"summary": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "513222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222"
},
{
"category": "external",
"summary": "515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1199.json"
}
],
"title": "Red Hat Security Advisory: java-1.5.0-sun security update",
"tracking": {
"current_release_date": "2026-03-13T01:03:30+00:00",
"generator": {
"date": "2026-03-13T01:03:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2009:1199",
"initial_release_date": "2009-08-06T20:38:00+00:00",
"revision_history": [
{
"date": "2009-08-06T20:38:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-06T16:38:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-13T01:03:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_id": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.20-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_id": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.20-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_id": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.20-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_id": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.20-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_id": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.20-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.20-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.20-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.20-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.20-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.20-1jpp.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"product": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"product_id": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.20-1jpp.1.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"product": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"product_id": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.20-1jpp.1.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"product": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"product_id": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.20-1jpp.1.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"product": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"product_id": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-plugin@1.5.0.20-1jpp.1.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"product": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"product_id": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.20-1jpp.1.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"product": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"product_id": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.20-1jpp.1.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"product": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"product_id": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-plugin@1.5.0.20-1jpp.1.el5?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"product": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"product_id": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.20-1jpp.1.el5?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"product": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"product_id": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.20-1jpp.1.el5?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"product": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"product_id": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.20-1jpp.1.el5?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"product": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"product_id": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.20-1jpp.1.el5?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"product": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"product_id": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.20-1jpp.1.el5?arch=i586"
}
}
}
],
"category": "architecture",
"name": "i586"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-2475",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513215"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2475"
},
{
"category": "external",
"summary": "RHBZ#513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2475",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2475"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
},
{
"cve": "CVE-2009-2676",
"discovery_date": "2009-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515890"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE applet launcher vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2676"
},
{
"category": "external",
"summary": "RHBZ#515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JRE applet launcher vulnerability"
},
{
"cve": "CVE-2009-2689",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513222"
}
],
"notes": [
{
"category": "description",
"text": "JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JDK13Services grants unnecessary privileges (6777448)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2689"
},
{
"category": "external",
"summary": "RHBZ#513222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2689"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK JDK13Services grants unnecessary privileges (6777448)"
},
{
"cve": "CVE-2009-2720",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516823"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK DoS with Swing Synthcontext implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2720"
},
{
"category": "external",
"summary": "RHBZ#516823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2720"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK DoS with Swing Synthcontext implementation"
},
{
"cve": "CVE-2009-2721",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516826"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6406003.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK Multiple unspecified vulnerabilities in Provider class",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2721"
},
{
"category": "external",
"summary": "RHBZ#516826",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516826"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2721",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2721"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2721",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2721"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK Multiple unspecified vulnerabilities in Provider class"
},
{
"cve": "CVE-2009-2722",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516829"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6429594. NOTE: this issue exists because of an incorrect fix for BugId 6406003.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK Multiple unspecified vulnerabilities in Provider class (incorrect fix)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2722"
},
{
"category": "external",
"summary": "RHBZ#516829",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516829"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2722",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2722"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2722",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2722"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK Multiple unspecified vulnerabilities in Provider class (incorrect fix)"
},
{
"cve": "CVE-2009-2723",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516832"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in deserialization in the Provider class in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, aka BugId 6444262.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK unspecified deserialization in Provider class",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2723"
},
{
"category": "external",
"summary": "RHBZ#516832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516832"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2723",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2723"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2723",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2723"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK unspecified deserialization in Provider class"
},
{
"cve": "CVE-2009-2724",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516834"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in the java.lang package in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, related to a \"3Y Race condition in reflection checks.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK race condition vulnerability reflection checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2724"
},
{
"category": "external",
"summary": "RHBZ#516834",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516834"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2724",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2724"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2724",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2724"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK race condition vulnerability reflection checks"
}
]
}
RHSA-2009:1236
Vulnerability from csaf_redhat - Published: 2009-08-28 08:57 - Updated: 2026-03-13 01:03Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.5.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 2 Runtime\nEnvironment and the IBM Java 2 Software Development Kit. These\nvulnerabilities are summarized on the IBM \"Security alerts\" page listed in\nthe References section. (CVE-2009-2625, CVE-2009-2670, CVE-2009-2671,\nCVE-2009-2672, CVE-2009-2673, CVE-2009-2675)\n\nAll users of java-1.5.0-ibm are advised to upgrade to these updated\npackages, containing the IBM 1.5.0 SR10 Java release. All running instances\nof IBM Java must be restarted for this update to take effect.\n\nNote: The packages included in this update are identical to the packages\nmade available by RHEA-2009:1208 and RHEA-2009:1210 on the 13th of\nAugust 2009. These packages are being reissued as a Red Hat Security\nAdvisory as they fixed a number of security issues that were not made\npublic until after those errata were released. Since the packages are\nidentical, there is no need to install this update if RHEA-2009:1208 or\nRHEA-2009:1210 has already been installed.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1236",
"url": "https://access.redhat.com/errata/RHSA-2009:1236"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1236.json"
}
],
"title": "Red Hat Security Advisory: java-1.5.0-ibm security update",
"tracking": {
"current_release_date": "2026-03-13T01:03:32+00:00",
"generator": {
"date": "2026-03-13T01:03:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2009:1236",
"initial_release_date": "2009-08-28T08:57:00+00:00",
"revision_history": [
{
"date": "2009-08-28T08:57:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-28T04:57:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-13T01:03:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.10-1jpp.4.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el4?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el4?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.10-1jpp.4.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el4?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.10-1jpp.4.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.10-1jpp.4.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el4?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-28T08:57:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-28T08:57:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-28T08:57:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-28T08:57:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-28T08:57:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-28T08:57:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
}
]
}
RHSA-2009_1199
Vulnerability from csaf_redhat - Published: 2009-08-06 20:38 - Updated: 2024-11-14 10:46Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.
JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.
Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors.
Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6406003.
Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6429594. NOTE: this issue exists because of an incorrect fix for BugId 6406003.
Unspecified vulnerability in deserialization in the Provider class in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, aka BugId 6444262.
Race condition in the java.lang package in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, related to a "3Y Race condition in reflection checks."
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.5.0-sun packages that correct several security issues are\nnow available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Sun 1.5.0 Java release includes the Sun Java 5 Runtime Environment and\nthe Sun Java 5 Software Development Kit.\n\nThis update fixes several vulnerabilities in the Sun Java 5 Runtime\nEnvironment and the Sun Java 5 Software Development Kit. These\nvulnerabilities are summarized on the \"Advance notification of Security\nUpdates for Java SE\" page from Sun Microsystems, listed in the References\nsection. (CVE-2009-2475, CVE-2009-2625, CVE-2009-2670, CVE-2009-2671,\nCVE-2009-2672, CVE-2009-2673, CVE-2009-2675, CVE-2009-2676, CVE-2009-2689)\n\nUsers of java-1.5.0-sun should upgrade to these updated packages, which\ncorrect these issues. All running instances of Sun Java must be restarted\nfor the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1199",
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5",
"url": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5"
},
{
"category": "external",
"summary": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "513222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222"
},
{
"category": "external",
"summary": "515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1199.json"
}
],
"title": "Red Hat Security Advisory: java-1.5.0-sun security update",
"tracking": {
"current_release_date": "2024-11-14T10:46:47+00:00",
"generator": {
"date": "2024-11-14T10:46:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2009:1199",
"initial_release_date": "2009-08-06T20:38:00+00:00",
"revision_history": [
{
"date": "2009-08-06T20:38:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-06T16:38:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T10:46:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_id": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.20-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_id": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.20-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_id": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.20-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_id": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.20-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_id": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.20-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.20-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.20-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.20-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.20-1jpp.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_id": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.20-1jpp.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"product": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"product_id": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.20-1jpp.1.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"product": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"product_id": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.20-1jpp.1.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"product": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"product_id": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.20-1jpp.1.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"product": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"product_id": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-plugin@1.5.0.20-1jpp.1.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"product": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"product_id": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.20-1jpp.1.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"product": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"product_id": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.20-1jpp.1.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"product": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"product_id": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-plugin@1.5.0.20-1jpp.1.el5?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"product": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"product_id": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.20-1jpp.1.el5?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"product": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"product_id": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.20-1jpp.1.el5?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"product": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"product_id": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.20-1jpp.1.el5?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"product": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"product_id": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.20-1jpp.1.el5?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"product": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"product_id": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.20-1jpp.1.el5?arch=i586"
}
}
}
],
"category": "architecture",
"name": "i586"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-2475",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513215"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2475"
},
{
"category": "external",
"summary": "RHBZ#513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2475",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2475"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
},
{
"cve": "CVE-2009-2676",
"discovery_date": "2009-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515890"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE applet launcher vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2676"
},
{
"category": "external",
"summary": "RHBZ#515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JRE applet launcher vulnerability"
},
{
"cve": "CVE-2009-2689",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513222"
}
],
"notes": [
{
"category": "description",
"text": "JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JDK13Services grants unnecessary privileges (6777448)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2689"
},
{
"category": "external",
"summary": "RHBZ#513222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2689"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK JDK13Services grants unnecessary privileges (6777448)"
},
{
"cve": "CVE-2009-2720",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516823"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK DoS with Swing Synthcontext implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2720"
},
{
"category": "external",
"summary": "RHBZ#516823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2720"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK DoS with Swing Synthcontext implementation"
},
{
"cve": "CVE-2009-2721",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516826"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6406003.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK Multiple unspecified vulnerabilities in Provider class",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2721"
},
{
"category": "external",
"summary": "RHBZ#516826",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516826"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2721",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2721"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2721",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2721"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK Multiple unspecified vulnerabilities in Provider class"
},
{
"cve": "CVE-2009-2722",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516829"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6429594. NOTE: this issue exists because of an incorrect fix for BugId 6406003.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK Multiple unspecified vulnerabilities in Provider class (incorrect fix)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2722"
},
{
"category": "external",
"summary": "RHBZ#516829",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516829"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2722",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2722"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2722",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2722"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK Multiple unspecified vulnerabilities in Provider class (incorrect fix)"
},
{
"cve": "CVE-2009-2723",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516832"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in deserialization in the Provider class in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, aka BugId 6444262.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK unspecified deserialization in Provider class",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2723"
},
{
"category": "external",
"summary": "RHBZ#516832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516832"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2723",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2723"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2723",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2723"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK unspecified deserialization in Provider class"
},
{
"cve": "CVE-2009-2724",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516834"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in the java.lang package in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, related to a \"3Y Race condition in reflection checks.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK race condition vulnerability reflection checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2724"
},
{
"category": "external",
"summary": "RHBZ#516834",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516834"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2724",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2724"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2724",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2724"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:38:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1199"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586",
"4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK race condition vulnerability reflection checks"
}
]
}
RHSA-2009_1201
Vulnerability from csaf_redhat - Published: 2009-08-06 21:14 - Updated: 2024-11-14 10:47The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.
The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.
The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-openjdk packages that fix several security issues and a\nbug are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "These packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit. The Java Runtime Environment (JRE)\ncontains the software and tools that users need to run applications written\nusing the Java programming language.\n\nA flaw was found in the way the XML Digital Signature implementation in the\nJRE handled HMAC-based XML signatures. An attacker could use this flaw to\ncreate a crafted signature that could allow them to bypass authentication,\nor trick a user, applet, or application into accepting untrusted content.\n(CVE-2009-0217)\n\nSeveral potential information leaks were found in various mutable static\nvariables. These could be exploited in application scenarios that execute\nuntrusted scripting code. (CVE-2009-2475)\n\nIt was discovered that OpenType checks can be bypassed. This could allow a\nrogue application to bypass access restrictions by acquiring references to\nprivileged objects through finalizer resurrection. (CVE-2009-2476)\n\nA denial of service flaw was found in the way the JRE processes XML. A\nremote attacker could use this flaw to supply crafted XML that would lead\nto a denial of service. (CVE-2009-2625)\n\nA flaw was found in the JRE audio system. An untrusted applet or\napplication could use this flaw to gain read access to restricted System\nproperties. (CVE-2009-2670)\n\nTwo flaws were found in the JRE proxy implementation. An untrusted applet\nor application could use these flaws to discover the usernames of users\nrunning applets and applications, or obtain web browser cookies and use\nthem for session hijacking attacks. (CVE-2009-2671, CVE-2009-2672)\n\nAn additional flaw was found in the proxy mechanism implementation. This\nflaw allowed an untrusted applet or application to bypass access\nrestrictions and communicate using non-authorized socket or URL connections\nto hosts other than the origin host. (CVE-2009-2673) \n\nAn integer overflow flaw was found in the way the JRE processes JPEG\nimages. An untrusted application could use this flaw to extend its\nprivileges, allowing it to read and write local files, as well as to\nexecute local applications with the privileges of the user running the\napplication. (CVE-2009-2674)\n\nAn integer overflow flaw was found in the JRE unpack200 functionality. An\nuntrusted applet or application could extend its privileges, allowing it to\nread and write local files, as well as to execute local applications with\nthe privileges of the user running the applet or application. (CVE-2009-2675)\n\nIt was discovered that JDK13Services grants unnecessary privileges to\ncertain object types. This could be misused by an untrusted applet or\napplication to use otherwise restricted functionality. (CVE-2009-2689)\n\nAn information disclosure flaw was found in the way private Java variables\nwere handled. An untrusted applet or application could use this flaw to\nobtain information from variables that would otherwise be private.\n(CVE-2009-2690)\n\nNote: The flaws concerning applets in this advisory, CVE-2009-2475,\nCVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2675,\nCVE-2009-2689, and CVE-2009-2690, can only be triggered in\njava-1.6.0-openjdk by calling the \"appletviewer\" application.\n\nThis update also fixes the following bug:\n\n* the EVR in the java-1.6.0-openjdk package as shipped with Red Hat\nEnterprise Linux allowed the java-1.6.0-openjdk package from the EPEL\nrepository to take precedence (appear newer). Users using\njava-1.6.0-openjdk from EPEL would not have received security updates since\nOctober 2008. This update prevents the packages from EPEL from taking\nprecedence. (BZ#499079)\n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1201",
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5",
"url": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5"
},
{
"category": "external",
"summary": "499079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=499079"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "513220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220"
},
{
"category": "external",
"summary": "513222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222"
},
{
"category": "external",
"summary": "513223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1201.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-openjdk security and bug fix update",
"tracking": {
"current_release_date": "2024-11-14T10:47:06+00:00",
"generator": {
"date": "2024-11-14T10:47:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2009:1201",
"initial_release_date": "2009-08-06T21:14:00+00:00",
"revision_history": [
{
"date": "2009-08-06T21:14:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-06T17:14:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T10:47:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.2.b09.el5?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-2475",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513215"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2475"
},
{
"category": "external",
"summary": "RHBZ#513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2475",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2475"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)"
},
{
"cve": "CVE-2009-2476",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513220"
}
],
"notes": [
{
"category": "description",
"text": "The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK OpenType checks can be bypassed (6736293)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2476"
},
{
"category": "external",
"summary": "RHBZ#513220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2476"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK OpenType checks can be bypassed (6736293)"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2674",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512915"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer JPEG processing integer overflow (6823373)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2674"
},
{
"category": "external",
"summary": "RHBZ#512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2674",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer JPEG processing integer overflow (6823373)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
},
{
"cve": "CVE-2009-2689",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513222"
}
],
"notes": [
{
"category": "description",
"text": "JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JDK13Services grants unnecessary privileges (6777448)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2689"
},
{
"category": "external",
"summary": "RHBZ#513222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2689"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK JDK13Services grants unnecessary privileges (6777448)"
},
{
"cve": "CVE-2009-2690",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513223"
}
],
"notes": [
{
"category": "description",
"text": "The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK private variable information disclosure (6777487)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2690"
},
{
"category": "external",
"summary": "RHBZ#513223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2690",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2690"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK private variable information disclosure (6777487)"
}
]
}
RHSA-2009:1201
Vulnerability from csaf_redhat - Published: 2009-08-06 21:14 - Updated: 2026-03-13 01:03The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.
The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.
Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.
The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-openjdk packages that fix several security issues and a\nbug are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "These packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit. The Java Runtime Environment (JRE)\ncontains the software and tools that users need to run applications written\nusing the Java programming language.\n\nA flaw was found in the way the XML Digital Signature implementation in the\nJRE handled HMAC-based XML signatures. An attacker could use this flaw to\ncreate a crafted signature that could allow them to bypass authentication,\nor trick a user, applet, or application into accepting untrusted content.\n(CVE-2009-0217)\n\nSeveral potential information leaks were found in various mutable static\nvariables. These could be exploited in application scenarios that execute\nuntrusted scripting code. (CVE-2009-2475)\n\nIt was discovered that OpenType checks can be bypassed. This could allow a\nrogue application to bypass access restrictions by acquiring references to\nprivileged objects through finalizer resurrection. (CVE-2009-2476)\n\nA denial of service flaw was found in the way the JRE processes XML. A\nremote attacker could use this flaw to supply crafted XML that would lead\nto a denial of service. (CVE-2009-2625)\n\nA flaw was found in the JRE audio system. An untrusted applet or\napplication could use this flaw to gain read access to restricted System\nproperties. (CVE-2009-2670)\n\nTwo flaws were found in the JRE proxy implementation. An untrusted applet\nor application could use these flaws to discover the usernames of users\nrunning applets and applications, or obtain web browser cookies and use\nthem for session hijacking attacks. (CVE-2009-2671, CVE-2009-2672)\n\nAn additional flaw was found in the proxy mechanism implementation. This\nflaw allowed an untrusted applet or application to bypass access\nrestrictions and communicate using non-authorized socket or URL connections\nto hosts other than the origin host. (CVE-2009-2673) \n\nAn integer overflow flaw was found in the way the JRE processes JPEG\nimages. An untrusted application could use this flaw to extend its\nprivileges, allowing it to read and write local files, as well as to\nexecute local applications with the privileges of the user running the\napplication. (CVE-2009-2674)\n\nAn integer overflow flaw was found in the JRE unpack200 functionality. An\nuntrusted applet or application could extend its privileges, allowing it to\nread and write local files, as well as to execute local applications with\nthe privileges of the user running the applet or application. (CVE-2009-2675)\n\nIt was discovered that JDK13Services grants unnecessary privileges to\ncertain object types. This could be misused by an untrusted applet or\napplication to use otherwise restricted functionality. (CVE-2009-2689)\n\nAn information disclosure flaw was found in the way private Java variables\nwere handled. An untrusted applet or application could use this flaw to\nobtain information from variables that would otherwise be private.\n(CVE-2009-2690)\n\nNote: The flaws concerning applets in this advisory, CVE-2009-2475,\nCVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2675,\nCVE-2009-2689, and CVE-2009-2690, can only be triggered in\njava-1.6.0-openjdk by calling the \"appletviewer\" application.\n\nThis update also fixes the following bug:\n\n* the EVR in the java-1.6.0-openjdk package as shipped with Red Hat\nEnterprise Linux allowed the java-1.6.0-openjdk package from the EPEL\nrepository to take precedence (appear newer). Users using\njava-1.6.0-openjdk from EPEL would not have received security updates since\nOctober 2008. This update prevents the packages from EPEL from taking\nprecedence. (BZ#499079)\n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1201",
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5",
"url": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5"
},
{
"category": "external",
"summary": "499079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=499079"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "513220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220"
},
{
"category": "external",
"summary": "513222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222"
},
{
"category": "external",
"summary": "513223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1201.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-openjdk security and bug fix update",
"tracking": {
"current_release_date": "2026-03-13T01:03:29+00:00",
"generator": {
"date": "2026-03-13T01:03:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2009:1201",
"initial_release_date": "2009-08-06T21:14:00+00:00",
"revision_history": [
{
"date": "2009-08-06T21:14:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-06T17:14:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-13T01:03:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.2.b09.el5?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-2475",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513215"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2475"
},
{
"category": "external",
"summary": "RHBZ#513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2475",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2475"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)"
},
{
"cve": "CVE-2009-2476",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513220"
}
],
"notes": [
{
"category": "description",
"text": "The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK OpenType checks can be bypassed (6736293)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2476"
},
{
"category": "external",
"summary": "RHBZ#513220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2476"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK OpenType checks can be bypassed (6736293)"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2674",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512915"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer JPEG processing integer overflow (6823373)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2674"
},
{
"category": "external",
"summary": "RHBZ#512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2674",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer JPEG processing integer overflow (6823373)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
},
{
"cve": "CVE-2009-2689",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513222"
}
],
"notes": [
{
"category": "description",
"text": "JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JDK13Services grants unnecessary privileges (6777448)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2689"
},
{
"category": "external",
"summary": "RHBZ#513222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2689"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK JDK13Services grants unnecessary privileges (6777448)"
},
{
"cve": "CVE-2009-2690",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513223"
}
],
"notes": [
{
"category": "description",
"text": "The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK private variable information disclosure (6777487)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2690"
},
{
"category": "external",
"summary": "RHBZ#513223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2690",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2690"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK private variable information disclosure (6777487)"
}
]
}
RHSA-2009_1662
Vulnerability from csaf_redhat - Published: 2009-12-11 13:42 - Updated: 2024-11-14 10:47Sun Java Runtime Environment (JRE) 1.5.0_6 and earlier, JDK 1.5.0_6 and earlier, and SDK 1.5.0_6 and earlier allows remote attackers to cause a denial of service (disk consumption) by using the Font.createFont function to create temporary files of arbitrary size in the %temp% directory.
Sun Java Web Start and Java Plug-in for JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allow remote attackers to execute arbitrary code via a crafted jnlp file that modifies the (1) java.home, (2) java.ext.dirs, or (3) user.home System Properties, aka "Java Web Start File Inclusion" and CR 6694892.
LdapCtx in the LDAP service in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier does not close the connection when initialization fails, which allows remote attackers to cause a denial of service (LDAP service hang).
Unspecified vulnerability in the LDAP implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier allows remote LDAP servers to execute arbitrary code via unknown vectors related to serialized data.
Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
Buffer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998.
Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.
Multiple unspecified vulnerabilities in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allow remote attackers to cause a denial of service (disk consumption) via vectors related to temporary font files and (1) "limits on Font creation," aka CR 6522586, and (2) another unspecified vector, aka CR 6632886.
Unspecified vulnerability in the Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to "deserializing applets," aka CR 6646860.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; and 1.4.2_19 and earlier does not prevent Javascript that is loaded from the localhost from connecting to other ports on the system, which allows user-assisted attackers to bypass intended access restrictions via LiveConnect, aka CR 6724331. NOTE: this vulnerability can be leveraged with separate cross-site scripting (XSS) vulnerabilities for remote attack vectors.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier, and 5.0 Update 17 and earlier, allows remote attackers to trick a user into trusting a signed applet via unknown vectors that misrepresent the security warning dialog, related to a "Swing JLabel HTML parsing vulnerability," aka CR 6782871.
The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.
Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.
JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.
Directory traversal vulnerability in the ICC_Profile.getInstance method in Java Runtime Environment (JRE) in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, allows remote attackers to determine the existence of local International Color Consortium (ICC) profile files via a .. (dot dot) in a pathname, aka Bug Id 6631533.
The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a "quantization problem," aka Bug Id 6862968.
Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.
Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.
Multiple unspecified vulnerabilities in the (1) X11 and (2) Win32GraphicsDevice subsystems in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and attack vectors, related to failure to clone arrays that are returned by the getConfigurations function, aka Bug Id 6822057.
The Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, does not properly restrict the objects that may be sent to loggers, which allows attackers to obtain sensitive information via vectors related to the implementation of Component, KeyboardFocusManager, and DefaultKeyboardFocusManager, aka Bug Id 6664512.
Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, does not prevent the existence of children of a resurrected ClassLoader, which allows remote attackers to gain privileges via unspecified vectors, related to an "information leak vulnerability," aka Bug Id 6636650.
Multiple unspecified vulnerabilities in the Swing implementation in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and remote attack vectors, related to "information leaks in mutable variables," aka Bug Id 6657026.
Multiple unspecified vulnerabilities in the Windows Pluggable Look and Feel (PL&F) feature in the Swing implementation in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and remote attack vectors, related to "information leaks in mutable variables," aka Bug Id 6657138.
The TimeZone.getTimeZone method in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, allows remote attackers to determine the existence of local files via vectors related to handling of zoneinfo (aka tz) files, aka Bug Id 6824265.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.5.0-sun packages that correct several security issues are\nnow available for Red Hat Network Satellite Server 5.1.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "This update corrects several security vulnerabilities in the Sun Java\nRuntime Environment shipped as part of Red Hat Network Satellite Server\n5.1. In a typical operating environment, these are of low security risk as\nthe runtime is not used on untrusted applets.\n\nSeveral flaws were fixed in the Sun Java 5 Runtime Environment.\n(CVE-2006-2426, CVE-2008-2086, CVE-2009-1093, CVE-2009-1094, CVE-2009-1095,\nCVE-2009-1096, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1103,\nCVE-2009-1104, CVE-2009-1107, CVE-2009-2409, CVE-2009-2475, CVE-2009-2625,\nCVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2675,\nCVE-2009-2676, CVE-2009-2689, CVE-2009-3728, CVE-2009-3873, CVE-2009-3876,\nCVE-2009-3877, CVE-2009-3879, CVE-2009-3880, CVE-2009-3881, CVE-2009-3882,\nCVE-2009-3883, CVE-2009-3884)\n\nNote: This is the final update for the java-1.5.0-sun packages, as the Sun\nJava SE Release family 5.0 has now reached End of Service Life. An\nalternative to Sun Java SE 5.0 is the Java 2 Technology Edition of the\nIBM Developer Kit for Linux, which is available from the Satellite 5.1\nchannels on the Red Hat Network.\n\nFor a long term solution, Red Hat advises users to switch from Sun Java SE\n5.0 to the Java 2 Technology Edition of the IBM Developer Kit for Linux.\nRefer to the Solution section for instructions.\n\nUsers of Red Hat Network Satellite Server 5.1 are advised to upgrade to\nthese updated java-1.5.0-sun packages, which resolve these issues. All\nrunning instances of Sun Java must be restarted for the update to take\neffect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1662",
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "395481",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=395481"
},
{
"category": "external",
"summary": "474556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=474556"
},
{
"category": "external",
"summary": "490167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490167"
},
{
"category": "external",
"summary": "490168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490168"
},
{
"category": "external",
"summary": "490169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169"
},
{
"category": "external",
"summary": "490178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490178"
},
{
"category": "external",
"summary": "492302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492302"
},
{
"category": "external",
"summary": "492305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492305"
},
{
"category": "external",
"summary": "492306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492306"
},
{
"category": "external",
"summary": "492308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492308"
},
{
"category": "external",
"summary": "492312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492312"
},
{
"category": "external",
"summary": "510197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510197"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "513222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222"
},
{
"category": "external",
"summary": "515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "530053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053"
},
{
"category": "external",
"summary": "530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "530098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530098"
},
{
"category": "external",
"summary": "530173",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530173"
},
{
"category": "external",
"summary": "530175",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530175"
},
{
"category": "external",
"summary": "530296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530296"
},
{
"category": "external",
"summary": "530297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530297"
},
{
"category": "external",
"summary": "530300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530300"
},
{
"category": "external",
"summary": "533185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533185"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1662.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Network Satellite Server Sun Java Runtime security update",
"tracking": {
"current_release_date": "2024-11-14T10:47:45+00:00",
"generator": {
"date": "2024-11-14T10:47:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2009:1662",
"initial_release_date": "2009-12-11T13:42:00+00:00",
"revision_history": [
{
"date": "2009-12-11T13:42:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-12-11T08:42:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T10:47:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product": {
"name": "Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.1::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Satellite"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64",
"product_id": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.22-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"product_id": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.22-1jpp.1.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"product": {
"name": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"product_id": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.22-1jpp.1.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"product": {
"name": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"product_id": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.22-1jpp.1.el4?arch=i586"
}
}
}
],
"category": "architecture",
"name": "i586"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-RHNSAT5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-RHNSAT5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-RHNSAT5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-RHNSAT5.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-2426",
"discovery_date": "2007-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "395481"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java Runtime Environment (JRE) 1.5.0_6 and earlier, JDK 1.5.0_6 and earlier, and SDK 1.5.0_6 and earlier allows remote attackers to cause a denial of service (disk consumption) by using the Font.createFont function to create temporary files of arbitrary size in the %temp% directory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Untrusted applet causes DoS by filling up disk space",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2426"
},
{
"category": "external",
"summary": "RHBZ#395481",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=395481"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2426"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2426",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2426"
}
],
"release_date": "2006-05-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Untrusted applet causes DoS by filling up disk space"
},
{
"cve": "CVE-2008-2086",
"discovery_date": "2008-12-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "474556"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java Web Start and Java Plug-in for JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allow remote attackers to execute arbitrary code via a crafted jnlp file that modifies the (1) java.home, (2) java.ext.dirs, or (3) user.home System Properties, aka \"Java Web Start File Inclusion\" and CR 6694892.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start File Inclusion via System Properties Override",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2086"
},
{
"category": "external",
"summary": "RHBZ#474556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=474556"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2086",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2086"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2086",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2086"
}
],
"release_date": "2008-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Java Web Start File Inclusion via System Properties Override"
},
{
"cve": "CVE-2009-1093",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490167"
}
],
"notes": [
{
"category": "description",
"text": "LdapCtx in the LDAP service in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier does not close the connection when initialization fails, which allows remote attackers to cause a denial of service (LDAP service hang).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK remote LDAP Denial-Of-Service (6717680)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1093"
},
{
"category": "external",
"summary": "RHBZ#490167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1093"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1093",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1093"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK remote LDAP Denial-Of-Service (6717680)"
},
{
"cve": "CVE-2009-1094",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490168"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the LDAP implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier allows remote LDAP servers to execute arbitrary code via unknown vectors related to serialized data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK LDAP client remote code execution (6737315)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1094"
},
{
"category": "external",
"summary": "RHBZ#490168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490168"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1094",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1094"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK LDAP client remote code execution (6737315)"
},
{
"cve": "CVE-2009-1095",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490169"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1095"
},
{
"category": "external",
"summary": "RHBZ#490169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1095"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)"
},
{
"cve": "CVE-2009-1096",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490169"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1096"
},
{
"category": "external",
"summary": "RHBZ#490169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1096",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1096"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1096",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1096"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)"
},
{
"cve": "CVE-2009-1098",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490178"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK GIF processing buffer overflow vulnerability (6804998)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1098"
},
{
"category": "external",
"summary": "RHBZ#490178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490178"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1098",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1098"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1098",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1098"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK GIF processing buffer overflow vulnerability (6804998)"
},
{
"cve": "CVE-2009-1099",
"discovery_date": "2009-03-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492302"
}
],
"notes": [
{
"category": "description",
"text": "Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Type1 font processing buffer overflow vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1099"
},
{
"category": "external",
"summary": "RHBZ#492302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492302"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1099",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1099"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1099",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1099"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Type1 font processing buffer overflow vulnerability"
},
{
"cve": "CVE-2009-1100",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492305"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allow remote attackers to cause a denial of service (disk consumption) via vectors related to temporary font files and (1) \"limits on Font creation,\" aka CR 6522586, and (2) another unspecified vector, aka CR 6632886.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: DoS (disk consumption) via handling of temporary font files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1100"
},
{
"category": "external",
"summary": "RHBZ#492305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1100",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1100"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: DoS (disk consumption) via handling of temporary font files"
},
{
"cve": "CVE-2009-1103",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492306"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to \"deserializing applets,\" aka CR 6646860.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Files disclosure, arbitrary code execution via \"deserializing applets\" (6646860)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1103"
},
{
"category": "external",
"summary": "RHBZ#492306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492306"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1103",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1103"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1103",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1103"
}
],
"release_date": "2009-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Files disclosure, arbitrary code execution via \"deserializing applets\" (6646860)"
},
{
"cve": "CVE-2009-1104",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492308"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; and 1.4.2_19 and earlier does not prevent Javascript that is loaded from the localhost from connecting to other ports on the system, which allows user-assisted attackers to bypass intended access restrictions via LiveConnect, aka CR 6724331. NOTE: this vulnerability can be leveraged with separate cross-site scripting (XSS) vulnerabilities for remote attack vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Intended access restrictions bypass via LiveConnect (6724331)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1104"
},
{
"category": "external",
"summary": "RHBZ#492308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492308"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1104"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Intended access restrictions bypass via LiveConnect (6724331)"
},
{
"cve": "CVE-2009-1107",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492312"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier, and 5.0 Update 17 and earlier, allows remote attackers to trick a user into trusting a signed applet via unknown vectors that misrepresent the security warning dialog, related to a \"Swing JLabel HTML parsing vulnerability,\" aka CR 6782871.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Signed applet remote misuse possibility (6782871)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1107"
},
{
"category": "external",
"summary": "RHBZ#492312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492312"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1107",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1107"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1107",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1107"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Signed applet remote misuse possibility (6782871)"
},
{
"cve": "CVE-2009-2409",
"discovery_date": "2009-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510197"
}
],
"notes": [
{
"category": "description",
"text": "The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "deprecate MD2 in SSL cert validation (Kaminsky)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2409"
},
{
"category": "external",
"summary": "RHBZ#510197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510197"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2409",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2409"
}
],
"release_date": "2009-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "deprecate MD2 in SSL cert validation (Kaminsky)"
},
{
"cve": "CVE-2009-2475",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513215"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2475"
},
{
"category": "external",
"summary": "RHBZ#513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2475",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2475"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
},
{
"cve": "CVE-2009-2676",
"discovery_date": "2009-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515890"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE applet launcher vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2676"
},
{
"category": "external",
"summary": "RHBZ#515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JRE applet launcher vulnerability"
},
{
"cve": "CVE-2009-2689",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513222"
}
],
"notes": [
{
"category": "description",
"text": "JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JDK13Services grants unnecessary privileges (6777448)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2689"
},
{
"category": "external",
"summary": "RHBZ#513222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2689"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK JDK13Services grants unnecessary privileges (6777448)"
},
{
"cve": "CVE-2009-3728",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530098"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in the ICC_Profile.getInstance method in Java Runtime Environment (JRE) in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, allows remote attackers to determine the existence of local International Color Consortium (ICC) profile files via a .. (dot dot) in a pathname, aka Bug Id 6631533.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ICC_Profile file existence detection information leak (6631533)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3728"
},
{
"category": "external",
"summary": "RHBZ#530098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530098"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3728",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3728"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK ICC_Profile file existence detection information leak (6631533)"
},
{
"cve": "CVE-2009-3873",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530053"
}
],
"notes": [
{
"category": "description",
"text": "The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a \"quantization problem,\" aka Bug Id 6862968.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JPEG Image Writer quantization problem (6862968)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3873"
},
{
"category": "external",
"summary": "RHBZ#530053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3873",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3873"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JPEG Image Writer quantization problem (6862968)"
},
{
"cve": "CVE-2009-3876",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530061"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3876"
},
{
"category": "external",
"summary": "RHBZ#530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3876",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877"
},
{
"cve": "CVE-2009-3877",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530061"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3877"
},
{
"category": "external",
"summary": "RHBZ#530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3877",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3877"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877"
},
{
"cve": "CVE-2009-3879",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530297"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the (1) X11 and (2) Win32GraphicsDevice subsystems in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and attack vectors, related to failure to clone arrays that are returned by the getConfigurations function, aka Bug Id 6822057.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK GraphicsConfiguration information leak(6822057)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3879"
},
{
"category": "external",
"summary": "RHBZ#530297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530297"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3879",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3879"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3879",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3879"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK GraphicsConfiguration information leak(6822057)"
},
{
"cve": "CVE-2009-3880",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530296"
}
],
"notes": [
{
"category": "description",
"text": "The Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, does not properly restrict the objects that may be sent to loggers, which allows attackers to obtain sensitive information via vectors related to the implementation of Component, KeyboardFocusManager, and DefaultKeyboardFocusManager, aka Bug Id 6664512.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK UI logging information leakage(6664512)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3880"
},
{
"category": "external",
"summary": "RHBZ#530296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530296"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3880",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3880"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3880",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3880"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK UI logging information leakage(6664512)"
},
{
"cve": "CVE-2009-3881",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530173"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, does not prevent the existence of children of a resurrected ClassLoader, which allows remote attackers to gain privileges via unspecified vectors, related to an \"information leak vulnerability,\" aka Bug Id 6636650.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK resurrected classloaders can still have children (6636650)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3881"
},
{
"category": "external",
"summary": "RHBZ#530173",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530173"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3881",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3881"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK resurrected classloaders can still have children (6636650)"
},
{
"cve": "CVE-2009-3882",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530175"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the Swing implementation in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and remote attack vectors, related to \"information leaks in mutable variables,\" aka Bug Id 6657026.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK information leaks in mutable variables (6657026,6657138)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3882"
},
{
"category": "external",
"summary": "RHBZ#530175",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530175"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3882",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3882"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3882",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3882"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK information leaks in mutable variables (6657026,6657138)"
},
{
"cve": "CVE-2009-3883",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530175"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the Windows Pluggable Look and Feel (PL\u0026F) feature in the Swing implementation in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and remote attack vectors, related to \"information leaks in mutable variables,\" aka Bug Id 6657138.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK information leaks in mutable variables (6657026,6657138)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3883"
},
{
"category": "external",
"summary": "RHBZ#530175",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530175"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3883",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3883"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK information leaks in mutable variables (6657026,6657138)"
},
{
"cve": "CVE-2009-3884",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530300"
}
],
"notes": [
{
"category": "description",
"text": "The TimeZone.getTimeZone method in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, allows remote attackers to determine the existence of local files via vectors related to handling of zoneinfo (aka tz) files, aka Bug Id 6824265.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK zoneinfo file existence information leak (6824265)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3884"
},
{
"category": "external",
"summary": "RHBZ#530300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3884",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3884"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK zoneinfo file existence information leak (6824265)"
}
]
}
RHSA-2009_1236
Vulnerability from csaf_redhat - Published: 2009-08-28 08:57 - Updated: 2024-11-14 10:46XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.5.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 2 Runtime\nEnvironment and the IBM Java 2 Software Development Kit. These\nvulnerabilities are summarized on the IBM \"Security alerts\" page listed in\nthe References section. (CVE-2009-2625, CVE-2009-2670, CVE-2009-2671,\nCVE-2009-2672, CVE-2009-2673, CVE-2009-2675)\n\nAll users of java-1.5.0-ibm are advised to upgrade to these updated\npackages, containing the IBM 1.5.0 SR10 Java release. All running instances\nof IBM Java must be restarted for this update to take effect.\n\nNote: The packages included in this update are identical to the packages\nmade available by RHEA-2009:1208 and RHEA-2009:1210 on the 13th of\nAugust 2009. These packages are being reissued as a Red Hat Security\nAdvisory as they fixed a number of security issues that were not made\npublic until after those errata were released. Since the packages are\nidentical, there is no need to install this update if RHEA-2009:1208 or\nRHEA-2009:1210 has already been installed.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1236",
"url": "https://access.redhat.com/errata/RHSA-2009:1236"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1236.json"
}
],
"title": "Red Hat Security Advisory: java-1.5.0-ibm security update",
"tracking": {
"current_release_date": "2024-11-14T10:46:26+00:00",
"generator": {
"date": "2024-11-14T10:46:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2009:1236",
"initial_release_date": "2009-08-28T08:57:00+00:00",
"revision_history": [
{
"date": "2009-08-28T08:57:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-28T04:57:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T10:46:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.10-1jpp.4.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el4?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el4?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"product": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"product_id": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"product": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.10-1jpp.4.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el4?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.10-1jpp.4.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"product": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"product": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"product": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.10-1jpp.4.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"product": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"product": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el4?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
},
"product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-28T08:57:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-28T08:57:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-28T08:57:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-28T08:57:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-28T08:57:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-28T08:57:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1236"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x",
"4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x",
"5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
}
]
}
RHSA-2009:1582
Vulnerability from csaf_redhat - Published: 2009-11-12 18:15 - Updated: 2026-03-13 01:03Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The IBM 1.6.0 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 2 Runtime\nEnvironment and the IBM Java 2 Software Development Kit. These\nvulnerabilities are summarized on the IBM \"Security alerts\" page listed in\nthe References section. (CVE-2009-2625, CVE-2009-2670, CVE-2009-2671,\nCVE-2009-2672, CVE-2009-2673, CVE-2009-2674, CVE-2009-2675, CVE-2009-2676)\n\nAll users of java-1.6.0-ibm are advised to upgrade to these updated\npackages, containing the IBM 1.6.0 SR6 Java release. All running instances\nof IBM Java must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1582",
"url": "https://access.redhat.com/errata/RHSA-2009:1582"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1582.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-ibm security update",
"tracking": {
"current_release_date": "2026-03-13T01:03:34+00:00",
"generator": {
"date": "2026-03-13T01:03:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2009:1582",
"initial_release_date": "2009-11-12T18:15:00+00:00",
"revision_history": [
{
"date": "2009-11-12T18:15:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-11-12T13:15:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-13T01:03:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el5?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.6-1jpp.3.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el5?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el5?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-12T18:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1582"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-12T18:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1582"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-12T18:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1582"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-12T18:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1582"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-12T18:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1582"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2674",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512915"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer JPEG processing integer overflow (6823373)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2674"
},
{
"category": "external",
"summary": "RHBZ#512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2674",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-12T18:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1582"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer JPEG processing integer overflow (6823373)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-12T18:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1582"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
},
{
"cve": "CVE-2009-2676",
"discovery_date": "2009-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515890"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE applet launcher vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2676"
},
{
"category": "external",
"summary": "RHBZ#515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-12T18:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1582"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JRE applet launcher vulnerability"
}
]
}
RHSA-2010_0043
Vulnerability from csaf_redhat - Published: 2010-01-14 16:32 - Updated: 2024-11-14 10:47The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
LdapCtx in the LDAP service in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier does not close the connection when initialization fails, which allows remote attackers to cause a denial of service (LDAP service hang).
Unspecified vulnerability in the LDAP implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier allows remote LDAP servers to execute arbitrary code via unknown vectors related to serialized data.
Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
Buffer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
Multiple buffer overflows in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allow remote attackers to access files or execute arbitrary code via (1) a crafted PNG image that triggers an integer overflow during memory allocation for display on the splash screen, aka CR 6804996; and (2) a crafted GIF image from which unspecified values are used in calculation of offsets, leading to object-pointer corruption, aka CR 6804997.
Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998.
Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.
Multiple unspecified vulnerabilities in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allow remote attackers to cause a denial of service (disk consumption) via vectors related to temporary font files and (1) "limits on Font creation," aka CR 6522586, and (2) another unspecified vector, aka CR 6632886.
Unspecified vulnerability in the lightweight HTTP server implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allows remote attackers to cause a denial of service (probably resource consumption) for a JAX-WS service endpoint via a connection without any data, which triggers a file descriptor "leak."
Unspecified vulnerability in the Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to "deserializing applets," aka CR 6646860.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; and 1.4.2_19 and earlier does not prevent Javascript that is loaded from the localhost from connecting to other ports on the system, which allows user-assisted attackers to bypass intended access restrictions via LiveConnect, aka CR 6724331. NOTE: this vulnerability can be leveraged with separate cross-site scripting (XSS) vulnerabilities for remote attack vectors.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 allows user-assisted remote attackers to cause a trusted applet to run in an older JRE version, which can be used to exploit vulnerabilities in that older version, aka CR 6706490.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 does not properly parse crossdomain.xml files, which allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unknown vectors, aka CR 6798948.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier, and 5.0 Update 17 and earlier, allows remote attackers to trick a user into trusting a signed applet via unknown vectors that misrepresent the security warning dialog, related to a "Swing JLabel HTML parsing vulnerability," aka CR 6782871.
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.
The launch method in the Deployment Toolkit plugin in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 6 before Update 17 allows remote attackers to execute arbitrary commands via a crafted web page, aka Bug Id 6869752.
The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to have a URL field that points to an unintended trusted application, aka Bug Id 6872824.
Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.
Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.
Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.
Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.
Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.
The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a "quantization problem," aka Bug Id 6862968.
Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.
The MessageDigest.isEqual function in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to spoof HMAC-based digital signatures, and possibly bypass authentication, via unspecified vectors related to "timing attack vulnerabilities," aka Bug Id 6863503.
Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.
Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Network Satellite Server 5.3.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "This update corrects several security vulnerabilities in the IBM Java\nRuntime Environment shipped as part of Red Hat Network Satellite Server\n5.3. In a typical operating environment, these are of low security risk as\nthe runtime is not used on untrusted applets.\n\nSeveral flaws were fixed in the IBM Java 2 Runtime Environment.\n(CVE-2009-0217, CVE-2009-1093, CVE-2009-1094, CVE-2009-1095, CVE-2009-1096,\nCVE-2009-1097, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1101,\nCVE-2009-1103, CVE-2009-1104, CVE-2009-1105, CVE-2009-1106, CVE-2009-1107,\nCVE-2009-2625, CVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673,\nCVE-2009-2674, CVE-2009-2675, CVE-2009-2676, CVE-2009-3865, CVE-2009-3866,\nCVE-2009-3867, CVE-2009-3868, CVE-2009-3869, CVE-2009-3871, CVE-2009-3872,\nCVE-2009-3873, CVE-2009-3874, CVE-2009-3875, CVE-2009-3876, CVE-2009-3877)\n\nUsers of Red Hat Network Satellite Server 5.3 are advised to upgrade to\nthese updated java-1.6.0-ibm packages, which resolve these issues. For this\nupdate to take effect, Red Hat Network Satellite Server must be restarted\n(\"/usr/sbin/rhn-satellite restart\"), as well as all running instances of\nIBM Java.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2010:0043",
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#low",
"url": "http://www.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "490166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490166"
},
{
"category": "external",
"summary": "490167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490167"
},
{
"category": "external",
"summary": "490168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490168"
},
{
"category": "external",
"summary": "490169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169"
},
{
"category": "external",
"summary": "490174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490174"
},
{
"category": "external",
"summary": "490178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490178"
},
{
"category": "external",
"summary": "492302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492302"
},
{
"category": "external",
"summary": "492305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492305"
},
{
"category": "external",
"summary": "492306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492306"
},
{
"category": "external",
"summary": "492308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492308"
},
{
"category": "external",
"summary": "492309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492309"
},
{
"category": "external",
"summary": "492310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492310"
},
{
"category": "external",
"summary": "492312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492312"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "530053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053"
},
{
"category": "external",
"summary": "530057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530057"
},
{
"category": "external",
"summary": "530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "530062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530062"
},
{
"category": "external",
"summary": "530063",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530063"
},
{
"category": "external",
"summary": "530067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530067"
},
{
"category": "external",
"summary": "532906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532906"
},
{
"category": "external",
"summary": "533211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533211"
},
{
"category": "external",
"summary": "533212",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533212"
},
{
"category": "external",
"summary": "533214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533214"
},
{
"category": "external",
"summary": "533215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533215"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0043.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Network Satellite Server IBM Java Runtime security update",
"tracking": {
"current_release_date": "2024-11-14T10:47:50+00:00",
"generator": {
"date": "2024-11-14T10:47:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2010:0043",
"initial_release_date": "2010-01-14T16:32:00+00:00",
"revision_history": [
{
"date": "2010-01-14T16:32:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2010-01-14T11:32:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T10:47:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Satellite 5.3 (RHEL v.4)",
"product": {
"name": "Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.3::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Satellite 5.3 (RHEL v.5)",
"product": {
"name": "Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.3::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat Satellite"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Satellite53"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-1093",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490167"
}
],
"notes": [
{
"category": "description",
"text": "LdapCtx in the LDAP service in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier does not close the connection when initialization fails, which allows remote attackers to cause a denial of service (LDAP service hang).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK remote LDAP Denial-Of-Service (6717680)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1093"
},
{
"category": "external",
"summary": "RHBZ#490167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1093"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1093",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1093"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK remote LDAP Denial-Of-Service (6717680)"
},
{
"cve": "CVE-2009-1094",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490168"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the LDAP implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier allows remote LDAP servers to execute arbitrary code via unknown vectors related to serialized data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK LDAP client remote code execution (6737315)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1094"
},
{
"category": "external",
"summary": "RHBZ#490168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490168"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1094",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1094"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK LDAP client remote code execution (6737315)"
},
{
"cve": "CVE-2009-1095",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490169"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1095"
},
{
"category": "external",
"summary": "RHBZ#490169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1095"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)"
},
{
"cve": "CVE-2009-1096",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490169"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1096"
},
{
"category": "external",
"summary": "RHBZ#490169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1096",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1096"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1096",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1096"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)"
},
{
"cve": "CVE-2009-1097",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490174"
}
],
"notes": [
{
"category": "description",
"text": "Multiple buffer overflows in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allow remote attackers to access files or execute arbitrary code via (1) a crafted PNG image that triggers an integer overflow during memory allocation for display on the splash screen, aka CR 6804996; and (2) a crafted GIF image from which unspecified values are used in calculation of offsets, leading to object-pointer corruption, aka CR 6804997.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: PNG and GIF processing buffer overflow vulnerabilities (6804996, 6804997)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1097"
},
{
"category": "external",
"summary": "RHBZ#490174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490174"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1097"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1097",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1097"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: PNG and GIF processing buffer overflow vulnerabilities (6804996, 6804997)"
},
{
"cve": "CVE-2009-1098",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490178"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK GIF processing buffer overflow vulnerability (6804998)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1098"
},
{
"category": "external",
"summary": "RHBZ#490178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490178"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1098",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1098"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1098",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1098"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK GIF processing buffer overflow vulnerability (6804998)"
},
{
"cve": "CVE-2009-1099",
"discovery_date": "2009-03-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492302"
}
],
"notes": [
{
"category": "description",
"text": "Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Type1 font processing buffer overflow vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1099"
},
{
"category": "external",
"summary": "RHBZ#492302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492302"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1099",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1099"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1099",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1099"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Type1 font processing buffer overflow vulnerability"
},
{
"cve": "CVE-2009-1100",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492305"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allow remote attackers to cause a denial of service (disk consumption) via vectors related to temporary font files and (1) \"limits on Font creation,\" aka CR 6522586, and (2) another unspecified vector, aka CR 6632886.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: DoS (disk consumption) via handling of temporary font files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1100"
},
{
"category": "external",
"summary": "RHBZ#492305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1100",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1100"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: DoS (disk consumption) via handling of temporary font files"
},
{
"cve": "CVE-2009-1101",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490166"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the lightweight HTTP server implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allows remote attackers to cause a denial of service (probably resource consumption) for a JAX-WS service endpoint via a connection without any data, which triggers a file descriptor \"leak.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JAX-WS service endpoint remote Denial-of-Service (6630639)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1101"
},
{
"category": "external",
"summary": "RHBZ#490166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1101"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1101",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1101"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JAX-WS service endpoint remote Denial-of-Service (6630639)"
},
{
"cve": "CVE-2009-1103",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492306"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to \"deserializing applets,\" aka CR 6646860.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Files disclosure, arbitrary code execution via \"deserializing applets\" (6646860)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1103"
},
{
"category": "external",
"summary": "RHBZ#492306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492306"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1103",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1103"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1103",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1103"
}
],
"release_date": "2009-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Files disclosure, arbitrary code execution via \"deserializing applets\" (6646860)"
},
{
"cve": "CVE-2009-1104",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492308"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; and 1.4.2_19 and earlier does not prevent Javascript that is loaded from the localhost from connecting to other ports on the system, which allows user-assisted attackers to bypass intended access restrictions via LiveConnect, aka CR 6724331. NOTE: this vulnerability can be leveraged with separate cross-site scripting (XSS) vulnerabilities for remote attack vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Intended access restrictions bypass via LiveConnect (6724331)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1104"
},
{
"category": "external",
"summary": "RHBZ#492308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492308"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1104"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Intended access restrictions bypass via LiveConnect (6724331)"
},
{
"cve": "CVE-2009-1105",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492309"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 allows user-assisted remote attackers to cause a trusted applet to run in an older JRE version, which can be used to exploit vulnerabilities in that older version, aka CR 6706490.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Possibility of trusted applet run in older, vulnerable version of JRE (6706490)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1105"
},
{
"category": "external",
"summary": "RHBZ#492309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492309"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1105",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1105"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1105",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1105"
}
],
"release_date": "2009-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Possibility of trusted applet run in older, vulnerable version of JRE (6706490)"
},
{
"cve": "CVE-2009-1106",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492310"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 does not properly parse crossdomain.xml files, which allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unknown vectors, aka CR 6798948.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Improper parsing of crossdomain.xml files (intended access restriction bypass) (6798948)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1106"
},
{
"category": "external",
"summary": "RHBZ#492310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1106",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1106"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1106",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1106"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Improper parsing of crossdomain.xml files (intended access restriction bypass) (6798948)"
},
{
"cve": "CVE-2009-1107",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492312"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier, and 5.0 Update 17 and earlier, allows remote attackers to trick a user into trusting a signed applet via unknown vectors that misrepresent the security warning dialog, related to a \"Swing JLabel HTML parsing vulnerability,\" aka CR 6782871.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Signed applet remote misuse possibility (6782871)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1107"
},
{
"category": "external",
"summary": "RHBZ#492312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492312"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1107",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1107"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1107",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1107"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Signed applet remote misuse possibility (6782871)"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2674",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512915"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer JPEG processing integer overflow (6823373)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2674"
},
{
"category": "external",
"summary": "RHBZ#512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2674",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer JPEG processing integer overflow (6823373)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
},
{
"cve": "CVE-2009-2676",
"discovery_date": "2009-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515890"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE applet launcher vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2676"
},
{
"category": "external",
"summary": "RHBZ#515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JRE applet launcher vulnerability"
},
{
"cve": "CVE-2009-3865",
"discovery_date": "2009-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533211"
}
],
"notes": [
{
"category": "description",
"text": "The launch method in the Deployment Toolkit plugin in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 6 before Update 17 allows remote attackers to execute arbitrary commands via a crafted web page, aka Bug Id 6869752.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: ACE in JRE Deployment Toolkit (6869752)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3865"
},
{
"category": "external",
"summary": "RHBZ#533211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533211"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3865",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3865"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3865",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3865"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "java-1.6.0-sun: ACE in JRE Deployment Toolkit (6869752)"
},
{
"cve": "CVE-2009-3866",
"discovery_date": "2009-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533212"
}
],
"notes": [
{
"category": "description",
"text": "The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to have a URL field that points to an unintended trusted application, aka Bug Id 6872824.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: Privilege escalation in the Java Web Start Installer (6872824)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3866"
},
{
"category": "external",
"summary": "RHBZ#533212",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533212"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3866",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3866"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-1.6.0-sun: Privilege escalation in the Java Web Start Installer (6872824)"
},
{
"cve": "CVE-2009-3867",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2009-11-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533214"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3867"
},
{
"category": "external",
"summary": "RHBZ#533214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533214"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3867",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3867"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3867",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3867"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303)"
},
{
"cve": "CVE-2009-3868",
"discovery_date": "2009-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533215"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3868"
},
{
"category": "external",
"summary": "RHBZ#533215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3868",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3868"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3868",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3868"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970)"
},
{
"cve": "CVE-2009-3869",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530062"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JRE AWT setDifflCM stack overflow (6872357)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3869"
},
{
"category": "external",
"summary": "RHBZ#530062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3869",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3869"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3869",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3869"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JRE AWT setDifflCM stack overflow (6872357)"
},
{
"cve": "CVE-2009-3871",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530063"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JRE AWT setBytePixels heap overflow (6872358)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3871"
},
{
"category": "external",
"summary": "RHBZ#530063",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530063"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3871",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3871"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3871",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3871"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JRE AWT setBytePixels heap overflow (6872358)"
},
{
"cve": "CVE-2009-3872",
"discovery_date": "2009-11-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "532906"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE JPEG JFIF Decoder issue (6862969)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3872"
},
{
"category": "external",
"summary": "RHBZ#532906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3872"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3872",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3872"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JRE JPEG JFIF Decoder issue (6862969)"
},
{
"cve": "CVE-2009-3873",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530053"
}
],
"notes": [
{
"category": "description",
"text": "The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a \"quantization problem,\" aka Bug Id 6862968.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JPEG Image Writer quantization problem (6862968)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3873"
},
{
"category": "external",
"summary": "RHBZ#530053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3873",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3873"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JPEG Image Writer quantization problem (6862968)"
},
{
"cve": "CVE-2009-3874",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530067"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ImageI/O JPEG heap overflow (6874643)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3874"
},
{
"category": "external",
"summary": "RHBZ#530067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3874"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3874",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3874"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK ImageI/O JPEG heap overflow (6874643)"
},
{
"cve": "CVE-2009-3875",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530057"
}
],
"notes": [
{
"category": "description",
"text": "The MessageDigest.isEqual function in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to spoof HMAC-based digital signatures, and possibly bypass authentication, via unspecified vectors related to \"timing attack vulnerabilities,\" aka Bug Id 6863503.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3875"
},
{
"category": "external",
"summary": "RHBZ#530057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530057"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3875"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3875",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3875"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503)"
},
{
"cve": "CVE-2009-3876",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530061"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3876"
},
{
"category": "external",
"summary": "RHBZ#530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3876",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877"
},
{
"cve": "CVE-2009-3877",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530061"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3877"
},
{
"category": "external",
"summary": "RHBZ#530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3877",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3877"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877"
}
]
}
RHSA-2010:0043
Vulnerability from csaf_redhat - Published: 2010-01-14 16:32 - Updated: 2026-03-13 01:03The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
LdapCtx in the LDAP service in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier does not close the connection when initialization fails, which allows remote attackers to cause a denial of service (LDAP service hang).
Unspecified vulnerability in the LDAP implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier allows remote LDAP servers to execute arbitrary code via unknown vectors related to serialized data.
Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
Buffer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
Multiple buffer overflows in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allow remote attackers to access files or execute arbitrary code via (1) a crafted PNG image that triggers an integer overflow during memory allocation for display on the splash screen, aka CR 6804996; and (2) a crafted GIF image from which unspecified values are used in calculation of offsets, leading to object-pointer corruption, aka CR 6804997.
Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998.
Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.
Multiple unspecified vulnerabilities in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allow remote attackers to cause a denial of service (disk consumption) via vectors related to temporary font files and (1) "limits on Font creation," aka CR 6522586, and (2) another unspecified vector, aka CR 6632886.
Unspecified vulnerability in the lightweight HTTP server implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allows remote attackers to cause a denial of service (probably resource consumption) for a JAX-WS service endpoint via a connection without any data, which triggers a file descriptor "leak."
Unspecified vulnerability in the Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to "deserializing applets," aka CR 6646860.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; and 1.4.2_19 and earlier does not prevent Javascript that is loaded from the localhost from connecting to other ports on the system, which allows user-assisted attackers to bypass intended access restrictions via LiveConnect, aka CR 6724331. NOTE: this vulnerability can be leveraged with separate cross-site scripting (XSS) vulnerabilities for remote attack vectors.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 allows user-assisted remote attackers to cause a trusted applet to run in an older JRE version, which can be used to exploit vulnerabilities in that older version, aka CR 6706490.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 does not properly parse crossdomain.xml files, which allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unknown vectors, aka CR 6798948.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier, and 5.0 Update 17 and earlier, allows remote attackers to trick a user into trusting a signed applet via unknown vectors that misrepresent the security warning dialog, related to a "Swing JLabel HTML parsing vulnerability," aka CR 6782871.
Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.
The launch method in the Deployment Toolkit plugin in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 6 before Update 17 allows remote attackers to execute arbitrary commands via a crafted web page, aka Bug Id 6869752.
The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to have a URL field that points to an unintended trusted application, aka Bug Id 6872824.
Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.
Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.
Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.
Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.
Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.
The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a "quantization problem," aka Bug Id 6862968.
Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.
The MessageDigest.isEqual function in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to spoof HMAC-based digital signatures, and possibly bypass authentication, via unspecified vectors related to "timing attack vulnerabilities," aka Bug Id 6863503.
Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.
Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Network Satellite Server 5.3.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "This update corrects several security vulnerabilities in the IBM Java\nRuntime Environment shipped as part of Red Hat Network Satellite Server\n5.3. In a typical operating environment, these are of low security risk as\nthe runtime is not used on untrusted applets.\n\nSeveral flaws were fixed in the IBM Java 2 Runtime Environment.\n(CVE-2009-0217, CVE-2009-1093, CVE-2009-1094, CVE-2009-1095, CVE-2009-1096,\nCVE-2009-1097, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1101,\nCVE-2009-1103, CVE-2009-1104, CVE-2009-1105, CVE-2009-1106, CVE-2009-1107,\nCVE-2009-2625, CVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673,\nCVE-2009-2674, CVE-2009-2675, CVE-2009-2676, CVE-2009-3865, CVE-2009-3866,\nCVE-2009-3867, CVE-2009-3868, CVE-2009-3869, CVE-2009-3871, CVE-2009-3872,\nCVE-2009-3873, CVE-2009-3874, CVE-2009-3875, CVE-2009-3876, CVE-2009-3877)\n\nUsers of Red Hat Network Satellite Server 5.3 are advised to upgrade to\nthese updated java-1.6.0-ibm packages, which resolve these issues. For this\nupdate to take effect, Red Hat Network Satellite Server must be restarted\n(\"/usr/sbin/rhn-satellite restart\"), as well as all running instances of\nIBM Java.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2010:0043",
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#low",
"url": "http://www.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "490166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490166"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "533212",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533212"
},
{
"category": "external",
"summary": "490167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490167"
},
{
"category": "external",
"summary": "490168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490168"
},
{
"category": "external",
"summary": "490169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169"
},
{
"category": "external",
"summary": "490174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490174"
},
{
"category": "external",
"summary": "490178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490178"
},
{
"category": "external",
"summary": "492302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492302"
},
{
"category": "external",
"summary": "492305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492305"
},
{
"category": "external",
"summary": "492306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492306"
},
{
"category": "external",
"summary": "492308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492308"
},
{
"category": "external",
"summary": "492309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492309"
},
{
"category": "external",
"summary": "492310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492310"
},
{
"category": "external",
"summary": "492312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492312"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "530053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053"
},
{
"category": "external",
"summary": "530057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530057"
},
{
"category": "external",
"summary": "530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "530062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530062"
},
{
"category": "external",
"summary": "530063",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530063"
},
{
"category": "external",
"summary": "530067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530067"
},
{
"category": "external",
"summary": "532906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532906"
},
{
"category": "external",
"summary": "533211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533211"
},
{
"category": "external",
"summary": "533214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533214"
},
{
"category": "external",
"summary": "533215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533215"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0043.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Network Satellite Server IBM Java Runtime security update",
"tracking": {
"current_release_date": "2026-03-13T01:03:40+00:00",
"generator": {
"date": "2026-03-13T01:03:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2010:0043",
"initial_release_date": "2010-01-14T16:32:00+00:00",
"revision_history": [
{
"date": "2010-01-14T16:32:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2010-01-14T11:32:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-13T01:03:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Satellite 5.3 (RHEL v.4)",
"product": {
"name": "Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.3::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Satellite 5.3 (RHEL v.5)",
"product": {
"name": "Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.3::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat Satellite"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Satellite53"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-1093",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490167"
}
],
"notes": [
{
"category": "description",
"text": "LdapCtx in the LDAP service in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier does not close the connection when initialization fails, which allows remote attackers to cause a denial of service (LDAP service hang).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK remote LDAP Denial-Of-Service (6717680)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1093"
},
{
"category": "external",
"summary": "RHBZ#490167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1093"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1093",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1093"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK remote LDAP Denial-Of-Service (6717680)"
},
{
"cve": "CVE-2009-1094",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490168"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the LDAP implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier allows remote LDAP servers to execute arbitrary code via unknown vectors related to serialized data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK LDAP client remote code execution (6737315)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1094"
},
{
"category": "external",
"summary": "RHBZ#490168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490168"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1094",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1094"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK LDAP client remote code execution (6737315)"
},
{
"cve": "CVE-2009-1095",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490169"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1095"
},
{
"category": "external",
"summary": "RHBZ#490169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1095"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)"
},
{
"cve": "CVE-2009-1096",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490169"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1096"
},
{
"category": "external",
"summary": "RHBZ#490169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1096",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1096"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1096",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1096"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)"
},
{
"cve": "CVE-2009-1097",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490174"
}
],
"notes": [
{
"category": "description",
"text": "Multiple buffer overflows in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allow remote attackers to access files or execute arbitrary code via (1) a crafted PNG image that triggers an integer overflow during memory allocation for display on the splash screen, aka CR 6804996; and (2) a crafted GIF image from which unspecified values are used in calculation of offsets, leading to object-pointer corruption, aka CR 6804997.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: PNG and GIF processing buffer overflow vulnerabilities (6804996, 6804997)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1097"
},
{
"category": "external",
"summary": "RHBZ#490174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490174"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1097"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1097",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1097"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: PNG and GIF processing buffer overflow vulnerabilities (6804996, 6804997)"
},
{
"cve": "CVE-2009-1098",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490178"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK GIF processing buffer overflow vulnerability (6804998)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1098"
},
{
"category": "external",
"summary": "RHBZ#490178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490178"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1098",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1098"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1098",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1098"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK GIF processing buffer overflow vulnerability (6804998)"
},
{
"cve": "CVE-2009-1099",
"discovery_date": "2009-03-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492302"
}
],
"notes": [
{
"category": "description",
"text": "Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Type1 font processing buffer overflow vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1099"
},
{
"category": "external",
"summary": "RHBZ#492302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492302"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1099",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1099"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1099",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1099"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Type1 font processing buffer overflow vulnerability"
},
{
"cve": "CVE-2009-1100",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492305"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allow remote attackers to cause a denial of service (disk consumption) via vectors related to temporary font files and (1) \"limits on Font creation,\" aka CR 6522586, and (2) another unspecified vector, aka CR 6632886.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: DoS (disk consumption) via handling of temporary font files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1100"
},
{
"category": "external",
"summary": "RHBZ#492305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1100",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1100"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: DoS (disk consumption) via handling of temporary font files"
},
{
"cve": "CVE-2009-1101",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490166"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the lightweight HTTP server implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allows remote attackers to cause a denial of service (probably resource consumption) for a JAX-WS service endpoint via a connection without any data, which triggers a file descriptor \"leak.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JAX-WS service endpoint remote Denial-of-Service (6630639)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1101"
},
{
"category": "external",
"summary": "RHBZ#490166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1101"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1101",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1101"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JAX-WS service endpoint remote Denial-of-Service (6630639)"
},
{
"cve": "CVE-2009-1103",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492306"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to \"deserializing applets,\" aka CR 6646860.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Files disclosure, arbitrary code execution via \"deserializing applets\" (6646860)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1103"
},
{
"category": "external",
"summary": "RHBZ#492306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492306"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1103",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1103"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1103",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1103"
}
],
"release_date": "2009-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Files disclosure, arbitrary code execution via \"deserializing applets\" (6646860)"
},
{
"cve": "CVE-2009-1104",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492308"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; and 1.4.2_19 and earlier does not prevent Javascript that is loaded from the localhost from connecting to other ports on the system, which allows user-assisted attackers to bypass intended access restrictions via LiveConnect, aka CR 6724331. NOTE: this vulnerability can be leveraged with separate cross-site scripting (XSS) vulnerabilities for remote attack vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Intended access restrictions bypass via LiveConnect (6724331)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1104"
},
{
"category": "external",
"summary": "RHBZ#492308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492308"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1104"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Intended access restrictions bypass via LiveConnect (6724331)"
},
{
"cve": "CVE-2009-1105",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492309"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 allows user-assisted remote attackers to cause a trusted applet to run in an older JRE version, which can be used to exploit vulnerabilities in that older version, aka CR 6706490.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Possibility of trusted applet run in older, vulnerable version of JRE (6706490)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1105"
},
{
"category": "external",
"summary": "RHBZ#492309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492309"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1105",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1105"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1105",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1105"
}
],
"release_date": "2009-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Possibility of trusted applet run in older, vulnerable version of JRE (6706490)"
},
{
"cve": "CVE-2009-1106",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492310"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 does not properly parse crossdomain.xml files, which allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unknown vectors, aka CR 6798948.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Improper parsing of crossdomain.xml files (intended access restriction bypass) (6798948)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1106"
},
{
"category": "external",
"summary": "RHBZ#492310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1106",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1106"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1106",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1106"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Improper parsing of crossdomain.xml files (intended access restriction bypass) (6798948)"
},
{
"cve": "CVE-2009-1107",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492312"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier, and 5.0 Update 17 and earlier, allows remote attackers to trick a user into trusting a signed applet via unknown vectors that misrepresent the security warning dialog, related to a \"Swing JLabel HTML parsing vulnerability,\" aka CR 6782871.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Signed applet remote misuse possibility (6782871)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1107"
},
{
"category": "external",
"summary": "RHBZ#492312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492312"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1107",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1107"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1107",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1107"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Signed applet remote misuse possibility (6782871)"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2674",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512915"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer JPEG processing integer overflow (6823373)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2674"
},
{
"category": "external",
"summary": "RHBZ#512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2674",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer JPEG processing integer overflow (6823373)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
},
{
"cve": "CVE-2009-2676",
"discovery_date": "2009-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515890"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE applet launcher vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2676"
},
{
"category": "external",
"summary": "RHBZ#515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JRE applet launcher vulnerability"
},
{
"cve": "CVE-2009-3865",
"discovery_date": "2009-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533211"
}
],
"notes": [
{
"category": "description",
"text": "The launch method in the Deployment Toolkit plugin in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 6 before Update 17 allows remote attackers to execute arbitrary commands via a crafted web page, aka Bug Id 6869752.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: ACE in JRE Deployment Toolkit (6869752)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3865"
},
{
"category": "external",
"summary": "RHBZ#533211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533211"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3865",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3865"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3865",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3865"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "java-1.6.0-sun: ACE in JRE Deployment Toolkit (6869752)"
},
{
"cve": "CVE-2009-3866",
"discovery_date": "2009-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533212"
}
],
"notes": [
{
"category": "description",
"text": "The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to have a URL field that points to an unintended trusted application, aka Bug Id 6872824.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: Privilege escalation in the Java Web Start Installer (6872824)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3866"
},
{
"category": "external",
"summary": "RHBZ#533212",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533212"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3866",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3866"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-1.6.0-sun: Privilege escalation in the Java Web Start Installer (6872824)"
},
{
"cve": "CVE-2009-3867",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2009-11-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533214"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3867"
},
{
"category": "external",
"summary": "RHBZ#533214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533214"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3867",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3867"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3867",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3867"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303)"
},
{
"cve": "CVE-2009-3868",
"discovery_date": "2009-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533215"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3868"
},
{
"category": "external",
"summary": "RHBZ#533215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3868",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3868"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3868",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3868"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970)"
},
{
"cve": "CVE-2009-3869",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530062"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JRE AWT setDifflCM stack overflow (6872357)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3869"
},
{
"category": "external",
"summary": "RHBZ#530062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3869",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3869"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3869",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3869"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JRE AWT setDifflCM stack overflow (6872357)"
},
{
"cve": "CVE-2009-3871",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530063"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JRE AWT setBytePixels heap overflow (6872358)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3871"
},
{
"category": "external",
"summary": "RHBZ#530063",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530063"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3871",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3871"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3871",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3871"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JRE AWT setBytePixels heap overflow (6872358)"
},
{
"cve": "CVE-2009-3872",
"discovery_date": "2009-11-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "532906"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE JPEG JFIF Decoder issue (6862969)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3872"
},
{
"category": "external",
"summary": "RHBZ#532906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3872"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3872",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3872"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JRE JPEG JFIF Decoder issue (6862969)"
},
{
"cve": "CVE-2009-3873",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530053"
}
],
"notes": [
{
"category": "description",
"text": "The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a \"quantization problem,\" aka Bug Id 6862968.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JPEG Image Writer quantization problem (6862968)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3873"
},
{
"category": "external",
"summary": "RHBZ#530053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3873",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3873"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JPEG Image Writer quantization problem (6862968)"
},
{
"cve": "CVE-2009-3874",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530067"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ImageI/O JPEG heap overflow (6874643)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3874"
},
{
"category": "external",
"summary": "RHBZ#530067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3874"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3874",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3874"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK ImageI/O JPEG heap overflow (6874643)"
},
{
"cve": "CVE-2009-3875",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530057"
}
],
"notes": [
{
"category": "description",
"text": "The MessageDigest.isEqual function in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to spoof HMAC-based digital signatures, and possibly bypass authentication, via unspecified vectors related to \"timing attack vulnerabilities,\" aka Bug Id 6863503.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3875"
},
{
"category": "external",
"summary": "RHBZ#530057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530057"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3875"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3875",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3875"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503)"
},
{
"cve": "CVE-2009-3876",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530061"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3876"
},
{
"category": "external",
"summary": "RHBZ#530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3876",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877"
},
{
"cve": "CVE-2009-3877",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530061"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3877"
},
{
"category": "external",
"summary": "RHBZ#530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3877",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3877"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877"
}
]
}
RHSA-2009:1662
Vulnerability from csaf_redhat - Published: 2009-12-11 13:42 - Updated: 2026-03-13 01:03Sun Java Runtime Environment (JRE) 1.5.0_6 and earlier, JDK 1.5.0_6 and earlier, and SDK 1.5.0_6 and earlier allows remote attackers to cause a denial of service (disk consumption) by using the Font.createFont function to create temporary files of arbitrary size in the %temp% directory.
Sun Java Web Start and Java Plug-in for JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allow remote attackers to execute arbitrary code via a crafted jnlp file that modifies the (1) java.home, (2) java.ext.dirs, or (3) user.home System Properties, aka "Java Web Start File Inclusion" and CR 6694892.
LdapCtx in the LDAP service in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier does not close the connection when initialization fails, which allows remote attackers to cause a denial of service (LDAP service hang).
Unspecified vulnerability in the LDAP implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier allows remote LDAP servers to execute arbitrary code via unknown vectors related to serialized data.
Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
Buffer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998.
Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.
Multiple unspecified vulnerabilities in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allow remote attackers to cause a denial of service (disk consumption) via vectors related to temporary font files and (1) "limits on Font creation," aka CR 6522586, and (2) another unspecified vector, aka CR 6632886.
Unspecified vulnerability in the Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to "deserializing applets," aka CR 6646860.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; and 1.4.2_19 and earlier does not prevent Javascript that is loaded from the localhost from connecting to other ports on the system, which allows user-assisted attackers to bypass intended access restrictions via LiveConnect, aka CR 6724331. NOTE: this vulnerability can be leveraged with separate cross-site scripting (XSS) vulnerabilities for remote attack vectors.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier, and 5.0 Update 17 and earlier, allows remote attackers to trick a user into trusting a signed applet via unknown vectors that misrepresent the security warning dialog, related to a "Swing JLabel HTML parsing vulnerability," aka CR 6782871.
The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.
Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.
Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.
JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.
Directory traversal vulnerability in the ICC_Profile.getInstance method in Java Runtime Environment (JRE) in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, allows remote attackers to determine the existence of local International Color Consortium (ICC) profile files via a .. (dot dot) in a pathname, aka Bug Id 6631533.
The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a "quantization problem," aka Bug Id 6862968.
Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.
Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.
Multiple unspecified vulnerabilities in the (1) X11 and (2) Win32GraphicsDevice subsystems in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and attack vectors, related to failure to clone arrays that are returned by the getConfigurations function, aka Bug Id 6822057.
The Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, does not properly restrict the objects that may be sent to loggers, which allows attackers to obtain sensitive information via vectors related to the implementation of Component, KeyboardFocusManager, and DefaultKeyboardFocusManager, aka Bug Id 6664512.
Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, does not prevent the existence of children of a resurrected ClassLoader, which allows remote attackers to gain privileges via unspecified vectors, related to an "information leak vulnerability," aka Bug Id 6636650.
Multiple unspecified vulnerabilities in the Swing implementation in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and remote attack vectors, related to "information leaks in mutable variables," aka Bug Id 6657026.
Multiple unspecified vulnerabilities in the Windows Pluggable Look and Feel (PL&F) feature in the Swing implementation in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and remote attack vectors, related to "information leaks in mutable variables," aka Bug Id 6657138.
The TimeZone.getTimeZone method in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, allows remote attackers to determine the existence of local files via vectors related to handling of zoneinfo (aka tz) files, aka Bug Id 6824265.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.5.0-sun packages that correct several security issues are\nnow available for Red Hat Network Satellite Server 5.1.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "This update corrects several security vulnerabilities in the Sun Java\nRuntime Environment shipped as part of Red Hat Network Satellite Server\n5.1. In a typical operating environment, these are of low security risk as\nthe runtime is not used on untrusted applets.\n\nSeveral flaws were fixed in the Sun Java 5 Runtime Environment.\n(CVE-2006-2426, CVE-2008-2086, CVE-2009-1093, CVE-2009-1094, CVE-2009-1095,\nCVE-2009-1096, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1103,\nCVE-2009-1104, CVE-2009-1107, CVE-2009-2409, CVE-2009-2475, CVE-2009-2625,\nCVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2675,\nCVE-2009-2676, CVE-2009-2689, CVE-2009-3728, CVE-2009-3873, CVE-2009-3876,\nCVE-2009-3877, CVE-2009-3879, CVE-2009-3880, CVE-2009-3881, CVE-2009-3882,\nCVE-2009-3883, CVE-2009-3884)\n\nNote: This is the final update for the java-1.5.0-sun packages, as the Sun\nJava SE Release family 5.0 has now reached End of Service Life. An\nalternative to Sun Java SE 5.0 is the Java 2 Technology Edition of the\nIBM Developer Kit for Linux, which is available from the Satellite 5.1\nchannels on the Red Hat Network.\n\nFor a long term solution, Red Hat advises users to switch from Sun Java SE\n5.0 to the Java 2 Technology Edition of the IBM Developer Kit for Linux.\nRefer to the Solution section for instructions.\n\nUsers of Red Hat Network Satellite Server 5.1 are advised to upgrade to\nthese updated java-1.5.0-sun packages, which resolve these issues. All\nrunning instances of Sun Java must be restarted for the update to take\neffect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1662",
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "395481",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=395481"
},
{
"category": "external",
"summary": "474556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=474556"
},
{
"category": "external",
"summary": "490167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490167"
},
{
"category": "external",
"summary": "490168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490168"
},
{
"category": "external",
"summary": "490169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169"
},
{
"category": "external",
"summary": "490178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490178"
},
{
"category": "external",
"summary": "492302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492302"
},
{
"category": "external",
"summary": "492305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492305"
},
{
"category": "external",
"summary": "492306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492306"
},
{
"category": "external",
"summary": "492308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492308"
},
{
"category": "external",
"summary": "492312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492312"
},
{
"category": "external",
"summary": "510197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510197"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "513222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222"
},
{
"category": "external",
"summary": "515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "530053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053"
},
{
"category": "external",
"summary": "530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "530098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530098"
},
{
"category": "external",
"summary": "530173",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530173"
},
{
"category": "external",
"summary": "530175",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530175"
},
{
"category": "external",
"summary": "530296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530296"
},
{
"category": "external",
"summary": "530297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530297"
},
{
"category": "external",
"summary": "530300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530300"
},
{
"category": "external",
"summary": "533185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533185"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1662.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Network Satellite Server Sun Java Runtime security update",
"tracking": {
"current_release_date": "2026-03-13T01:03:39+00:00",
"generator": {
"date": "2026-03-13T01:03:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2009:1662",
"initial_release_date": "2009-12-11T13:42:00+00:00",
"revision_history": [
{
"date": "2009-12-11T13:42:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-12-11T08:42:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-13T01:03:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product": {
"name": "Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.1::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Satellite"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64",
"product_id": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.22-1jpp.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"product_id": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.22-1jpp.1.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"product": {
"name": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"product_id": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.22-1jpp.1.el4?arch=i586"
}
}
},
{
"category": "product_version",
"name": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"product": {
"name": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"product_id": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.22-1jpp.1.el4?arch=i586"
}
}
}
],
"category": "architecture",
"name": "i586"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-RHNSAT5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-RHNSAT5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-RHNSAT5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)",
"product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-RHNSAT5.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-2426",
"discovery_date": "2007-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "395481"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java Runtime Environment (JRE) 1.5.0_6 and earlier, JDK 1.5.0_6 and earlier, and SDK 1.5.0_6 and earlier allows remote attackers to cause a denial of service (disk consumption) by using the Font.createFont function to create temporary files of arbitrary size in the %temp% directory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Untrusted applet causes DoS by filling up disk space",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2426"
},
{
"category": "external",
"summary": "RHBZ#395481",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=395481"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2426"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2426",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2426"
}
],
"release_date": "2006-05-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Untrusted applet causes DoS by filling up disk space"
},
{
"cve": "CVE-2008-2086",
"discovery_date": "2008-12-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "474556"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java Web Start and Java Plug-in for JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allow remote attackers to execute arbitrary code via a crafted jnlp file that modifies the (1) java.home, (2) java.ext.dirs, or (3) user.home System Properties, aka \"Java Web Start File Inclusion\" and CR 6694892.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start File Inclusion via System Properties Override",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2086"
},
{
"category": "external",
"summary": "RHBZ#474556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=474556"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2086",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2086"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2086",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2086"
}
],
"release_date": "2008-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Java Web Start File Inclusion via System Properties Override"
},
{
"cve": "CVE-2009-1093",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490167"
}
],
"notes": [
{
"category": "description",
"text": "LdapCtx in the LDAP service in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier does not close the connection when initialization fails, which allows remote attackers to cause a denial of service (LDAP service hang).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK remote LDAP Denial-Of-Service (6717680)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1093"
},
{
"category": "external",
"summary": "RHBZ#490167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1093"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1093",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1093"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK remote LDAP Denial-Of-Service (6717680)"
},
{
"cve": "CVE-2009-1094",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490168"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the LDAP implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier allows remote LDAP servers to execute arbitrary code via unknown vectors related to serialized data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK LDAP client remote code execution (6737315)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1094"
},
{
"category": "external",
"summary": "RHBZ#490168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490168"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1094",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1094"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK LDAP client remote code execution (6737315)"
},
{
"cve": "CVE-2009-1095",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490169"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1095"
},
{
"category": "external",
"summary": "RHBZ#490169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1095"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)"
},
{
"cve": "CVE-2009-1096",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490169"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1096"
},
{
"category": "external",
"summary": "RHBZ#490169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1096",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1096"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1096",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1096"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)"
},
{
"cve": "CVE-2009-1098",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490178"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK GIF processing buffer overflow vulnerability (6804998)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1098"
},
{
"category": "external",
"summary": "RHBZ#490178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490178"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1098",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1098"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1098",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1098"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK GIF processing buffer overflow vulnerability (6804998)"
},
{
"cve": "CVE-2009-1099",
"discovery_date": "2009-03-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492302"
}
],
"notes": [
{
"category": "description",
"text": "Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Type1 font processing buffer overflow vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1099"
},
{
"category": "external",
"summary": "RHBZ#492302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492302"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1099",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1099"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1099",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1099"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Type1 font processing buffer overflow vulnerability"
},
{
"cve": "CVE-2009-1100",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492305"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allow remote attackers to cause a denial of service (disk consumption) via vectors related to temporary font files and (1) \"limits on Font creation,\" aka CR 6522586, and (2) another unspecified vector, aka CR 6632886.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: DoS (disk consumption) via handling of temporary font files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1100"
},
{
"category": "external",
"summary": "RHBZ#492305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1100",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1100"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: DoS (disk consumption) via handling of temporary font files"
},
{
"cve": "CVE-2009-1103",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492306"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to \"deserializing applets,\" aka CR 6646860.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Files disclosure, arbitrary code execution via \"deserializing applets\" (6646860)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1103"
},
{
"category": "external",
"summary": "RHBZ#492306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492306"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1103",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1103"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1103",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1103"
}
],
"release_date": "2009-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Files disclosure, arbitrary code execution via \"deserializing applets\" (6646860)"
},
{
"cve": "CVE-2009-1104",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492308"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; and 1.4.2_19 and earlier does not prevent Javascript that is loaded from the localhost from connecting to other ports on the system, which allows user-assisted attackers to bypass intended access restrictions via LiveConnect, aka CR 6724331. NOTE: this vulnerability can be leveraged with separate cross-site scripting (XSS) vulnerabilities for remote attack vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Intended access restrictions bypass via LiveConnect (6724331)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1104"
},
{
"category": "external",
"summary": "RHBZ#492308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492308"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1104"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Intended access restrictions bypass via LiveConnect (6724331)"
},
{
"cve": "CVE-2009-1107",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492312"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier, and 5.0 Update 17 and earlier, allows remote attackers to trick a user into trusting a signed applet via unknown vectors that misrepresent the security warning dialog, related to a \"Swing JLabel HTML parsing vulnerability,\" aka CR 6782871.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Signed applet remote misuse possibility (6782871)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1107"
},
{
"category": "external",
"summary": "RHBZ#492312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492312"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1107",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1107"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1107",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1107"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Signed applet remote misuse possibility (6782871)"
},
{
"cve": "CVE-2009-2409",
"discovery_date": "2009-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510197"
}
],
"notes": [
{
"category": "description",
"text": "The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "deprecate MD2 in SSL cert validation (Kaminsky)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2409"
},
{
"category": "external",
"summary": "RHBZ#510197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510197"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2409",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2409"
}
],
"release_date": "2009-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "deprecate MD2 in SSL cert validation (Kaminsky)"
},
{
"cve": "CVE-2009-2475",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513215"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2475"
},
{
"category": "external",
"summary": "RHBZ#513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2475",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2475"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
},
{
"cve": "CVE-2009-2676",
"discovery_date": "2009-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515890"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE applet launcher vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2676"
},
{
"category": "external",
"summary": "RHBZ#515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JRE applet launcher vulnerability"
},
{
"cve": "CVE-2009-2689",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513222"
}
],
"notes": [
{
"category": "description",
"text": "JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JDK13Services grants unnecessary privileges (6777448)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2689"
},
{
"category": "external",
"summary": "RHBZ#513222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2689"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK JDK13Services grants unnecessary privileges (6777448)"
},
{
"cve": "CVE-2009-3728",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530098"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in the ICC_Profile.getInstance method in Java Runtime Environment (JRE) in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, allows remote attackers to determine the existence of local International Color Consortium (ICC) profile files via a .. (dot dot) in a pathname, aka Bug Id 6631533.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ICC_Profile file existence detection information leak (6631533)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3728"
},
{
"category": "external",
"summary": "RHBZ#530098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530098"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3728",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3728"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK ICC_Profile file existence detection information leak (6631533)"
},
{
"cve": "CVE-2009-3873",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530053"
}
],
"notes": [
{
"category": "description",
"text": "The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a \"quantization problem,\" aka Bug Id 6862968.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JPEG Image Writer quantization problem (6862968)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3873"
},
{
"category": "external",
"summary": "RHBZ#530053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3873",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3873"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JPEG Image Writer quantization problem (6862968)"
},
{
"cve": "CVE-2009-3876",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530061"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3876"
},
{
"category": "external",
"summary": "RHBZ#530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3876",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877"
},
{
"cve": "CVE-2009-3877",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530061"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3877"
},
{
"category": "external",
"summary": "RHBZ#530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3877",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3877"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877"
},
{
"cve": "CVE-2009-3879",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530297"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the (1) X11 and (2) Win32GraphicsDevice subsystems in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and attack vectors, related to failure to clone arrays that are returned by the getConfigurations function, aka Bug Id 6822057.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK GraphicsConfiguration information leak(6822057)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3879"
},
{
"category": "external",
"summary": "RHBZ#530297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530297"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3879",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3879"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3879",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3879"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK GraphicsConfiguration information leak(6822057)"
},
{
"cve": "CVE-2009-3880",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530296"
}
],
"notes": [
{
"category": "description",
"text": "The Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, does not properly restrict the objects that may be sent to loggers, which allows attackers to obtain sensitive information via vectors related to the implementation of Component, KeyboardFocusManager, and DefaultKeyboardFocusManager, aka Bug Id 6664512.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK UI logging information leakage(6664512)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3880"
},
{
"category": "external",
"summary": "RHBZ#530296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530296"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3880",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3880"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3880",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3880"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK UI logging information leakage(6664512)"
},
{
"cve": "CVE-2009-3881",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530173"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, does not prevent the existence of children of a resurrected ClassLoader, which allows remote attackers to gain privileges via unspecified vectors, related to an \"information leak vulnerability,\" aka Bug Id 6636650.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK resurrected classloaders can still have children (6636650)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3881"
},
{
"category": "external",
"summary": "RHBZ#530173",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530173"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3881",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3881"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK resurrected classloaders can still have children (6636650)"
},
{
"cve": "CVE-2009-3882",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530175"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the Swing implementation in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and remote attack vectors, related to \"information leaks in mutable variables,\" aka Bug Id 6657026.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK information leaks in mutable variables (6657026,6657138)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3882"
},
{
"category": "external",
"summary": "RHBZ#530175",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530175"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3882",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3882"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3882",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3882"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK information leaks in mutable variables (6657026,6657138)"
},
{
"cve": "CVE-2009-3883",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530175"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the Windows Pluggable Look and Feel (PL\u0026F) feature in the Swing implementation in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and remote attack vectors, related to \"information leaks in mutable variables,\" aka Bug Id 6657138.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK information leaks in mutable variables (6657026,6657138)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3883"
},
{
"category": "external",
"summary": "RHBZ#530175",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530175"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3883",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3883"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK information leaks in mutable variables (6657026,6657138)"
},
{
"cve": "CVE-2009-3884",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530300"
}
],
"notes": [
{
"category": "description",
"text": "The TimeZone.getTimeZone method in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, allows remote attackers to determine the existence of local files via vectors related to handling of zoneinfo (aka tz) files, aka Bug Id 6824265.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK zoneinfo file existence information leak (6824265)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3884"
},
{
"category": "external",
"summary": "RHBZ#530300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3884",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3884"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-11T13:42:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start",
"product_ids": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1662"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586",
"4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK zoneinfo file existence information leak (6824265)"
}
]
}
RHSA-2009:1200
Vulnerability from csaf_redhat - Published: 2009-08-06 20:41 - Updated: 2026-03-13 01:03The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.
The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.
Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.
The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.
The plugin functionality in Sun Java SE 6 before Update 15 does not properly implement version selection, which allows context-dependent attackers to leverage vulnerabilities in "old zip and certificate handling" and have unspecified other impact via unknown vectors.
The Abstract Window Toolkit (AWT) implementation in Sun Java SE 6 before Update 15 on X11 does not impose the intended constraint on distance from the window border to the Security Warning Icon, which makes it easier for context-dependent attackers to trick a user into interacting unsafely with an untrusted applet.
The Java Web Start implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException) via a crafted .jnlp file, as demonstrated by the jnlp_file/appletDesc/index.html#misc test in the Technology Compatibility Kit (TCK) for the Java Network Launching Protocol (JNLP).
Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-sun packages that correct several security issues are\nnow available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and\nthe Sun Java 6 Software Development Kit.\n\nThis update fixes several vulnerabilities in the Sun Java 6 Runtime\nEnvironment and the Sun Java 6 Software Development Kit. These\nvulnerabilities are summarized on the \"Advance notification of Security\nUpdates for Java SE\" page from Sun Microsystems, listed in the References\nsection. (CVE-2009-0217, CVE-2009-2475, CVE-2009-2476, CVE-2009-2625,\nCVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2674,\nCVE-2009-2675, CVE-2009-2676, CVE-2009-2690)\n\nUsers of java-1.6.0-sun should upgrade to these updated packages, which\ncorrect these issues. All running instances of Sun Java must be restarted\nfor the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1200",
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5",
"url": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5"
},
{
"category": "external",
"summary": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "513220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220"
},
{
"category": "external",
"summary": "513223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223"
},
{
"category": "external",
"summary": "515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1200.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-sun security update",
"tracking": {
"current_release_date": "2026-03-13T01:03:29+00:00",
"generator": {
"date": "2026-03-13T01:03:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2009:1200",
"initial_release_date": "2009-08-06T20:41:00+00:00",
"revision_history": [
{
"date": "2009-08-06T20:41:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-06T16:41:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-13T01:03:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i586"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-2475",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513215"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2475"
},
{
"category": "external",
"summary": "RHBZ#513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2475",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2475"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)"
},
{
"cve": "CVE-2009-2476",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513220"
}
],
"notes": [
{
"category": "description",
"text": "The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK OpenType checks can be bypassed (6736293)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2476"
},
{
"category": "external",
"summary": "RHBZ#513220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2476"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK OpenType checks can be bypassed (6736293)"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2674",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512915"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer JPEG processing integer overflow (6823373)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2674"
},
{
"category": "external",
"summary": "RHBZ#512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2674",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer JPEG processing integer overflow (6823373)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
},
{
"cve": "CVE-2009-2676",
"discovery_date": "2009-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515890"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE applet launcher vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2676"
},
{
"category": "external",
"summary": "RHBZ#515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JRE applet launcher vulnerability"
},
{
"cve": "CVE-2009-2690",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513223"
}
],
"notes": [
{
"category": "description",
"text": "The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK private variable information disclosure (6777487)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2690"
},
{
"category": "external",
"summary": "RHBZ#513223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2690",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2690"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK private variable information disclosure (6777487)"
},
{
"cve": "CVE-2009-2716",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516812"
}
],
"notes": [
{
"category": "description",
"text": "The plugin functionality in Sun Java SE 6 before Update 15 does not properly implement version selection, which allows context-dependent attackers to leverage vulnerabilities in \"old zip and certificate handling\" and have unspecified other impact via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK improper version selection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2716"
},
{
"category": "external",
"summary": "RHBZ#516812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516812"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2716"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK improper version selection"
},
{
"cve": "CVE-2009-2718",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516815"
}
],
"notes": [
{
"category": "description",
"text": "The Abstract Window Toolkit (AWT) implementation in Sun Java SE 6 before Update 15 on X11 does not impose the intended constraint on distance from the window border to the Security Warning Icon, which makes it easier for context-dependent attackers to trick a user into interacting unsafely with an untrusted applet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK reposition of untrusted applet security icon in X11",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2718"
},
{
"category": "external",
"summary": "RHBZ#516815",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516815"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2718",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2718"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK reposition of untrusted applet security icon in X11"
},
{
"cve": "CVE-2009-2719",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516820"
}
],
"notes": [
{
"category": "description",
"text": "The Java Web Start implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException) via a crafted .jnlp file, as demonstrated by the jnlp_file/appletDesc/index.html#misc test in the Technology Compatibility Kit (TCK) for the Java Network Launching Protocol (JNLP).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK DoS with crafted .jnlp file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2719"
},
{
"category": "external",
"summary": "RHBZ#516820",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516820"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2719"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK DoS with crafted .jnlp file"
},
{
"cve": "CVE-2009-2720",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516823"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK DoS with Swing Synthcontext implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2720"
},
{
"category": "external",
"summary": "RHBZ#516823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2720"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK DoS with Swing Synthcontext implementation"
}
]
}
RHSA-2009_1582
Vulnerability from csaf_redhat - Published: 2009-11-12 18:15 - Updated: 2024-11-14 10:47XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The IBM 1.6.0 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 2 Runtime\nEnvironment and the IBM Java 2 Software Development Kit. These\nvulnerabilities are summarized on the IBM \"Security alerts\" page listed in\nthe References section. (CVE-2009-2625, CVE-2009-2670, CVE-2009-2671,\nCVE-2009-2672, CVE-2009-2673, CVE-2009-2674, CVE-2009-2675, CVE-2009-2676)\n\nAll users of java-1.6.0-ibm are advised to upgrade to these updated\npackages, containing the IBM 1.6.0 SR6 Java release. All running instances\nof IBM Java must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1582",
"url": "https://access.redhat.com/errata/RHSA-2009:1582"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1582.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-ibm security update",
"tracking": {
"current_release_date": "2024-11-14T10:47:07+00:00",
"generator": {
"date": "2024-11-14T10:47:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2009:1582",
"initial_release_date": "2009-11-12T18:15:00+00:00",
"revision_history": [
{
"date": "2009-11-12T18:15:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-11-12T13:15:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T10:47:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el5?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.6-1jpp.3.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el5?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el5?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-12T18:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1582"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-12T18:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1582"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-12T18:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1582"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-12T18:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1582"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-12T18:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1582"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2674",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512915"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer JPEG processing integer overflow (6823373)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2674"
},
{
"category": "external",
"summary": "RHBZ#512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2674",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-12T18:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1582"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer JPEG processing integer overflow (6823373)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-12T18:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1582"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
},
{
"cve": "CVE-2009-2676",
"discovery_date": "2009-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515890"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE applet launcher vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2676"
},
{
"category": "external",
"summary": "RHBZ#515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-12T18:15:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1582"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JRE applet launcher vulnerability"
}
]
}
CERTA-2009-AVI-365
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités dans IBM Java permettent à un utilisateur distant malintentionné de porter atteinte à la confidentialité et à l'intégrité des données, de contourner la politique de sécurité, de provoquer un déni de service ou encore d'exécuter du code arbitraire avec des privilèges élevés.
Description
- Une vulnérabilité dans le système audio du Java Runtime Environment peut être exploitée afin de porter atteinte à la confidentialité des propriétés du système (CVE-2009-2670) ;
- trois vulnérabilités dans la mise en œuvre du serveur mandataire (proxy) dans Java Runtime Environment permettent à un utilisateur de porter atteinte à la confidentialité des données et d'obtenir un cookie de session de navigation ou de réaliser des connexions non autorisées depuis le système vulnérable (CVE-2009-2671, CVE-2009-2672 et CVE-2009-2673) ;
- une vulnérabilité de type débordement de mémoire permet à un utilisateur de faire exécuter une appliquette Java non-sûre avec des privilèges élevés (CVE-2009-2675).
- une vulnérabilité présente dans l'appliquette JNLPAppletLauncher permet à un utilisateur distant malveillant de porter atteinte à l'intégrité du système et potentiellement d'exécuter du code arbitraire sous la forme d'une appliquette.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Java 5.x :",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Java 6.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\n- Une vuln\u00e9rabilit\u00e9 dans le syst\u00e8me audio du Java Runtime Environment\n peut \u00eatre exploit\u00e9e afin de porter atteinte \u00e0 la confidentialit\u00e9 des\n propri\u00e9t\u00e9s du syst\u00e8me (CVE-2009-2670) ;\n- trois vuln\u00e9rabilit\u00e9s dans la mise en \u0153uvre du serveur mandataire\n (proxy) dans Java Runtime Environment permettent \u00e0 un utilisateur de\n porter atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et d\u0027obtenir un\n cookie de session de navigation ou de r\u00e9aliser des connexions non\n autoris\u00e9es depuis le syst\u00e8me vuln\u00e9rable (CVE-2009-2671,\n CVE-2009-2672 et CVE-2009-2673) ;\n- une vuln\u00e9rabilit\u00e9 de type d\u00e9bordement de m\u00e9moire permet \u00e0 un\n utilisateur de faire ex\u00e9cuter une appliquette Java non-s\u00fbre avec des\n privil\u00e8ges \u00e9lev\u00e9s (CVE-2009-2675).\n- une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans l\u0027appliquette JNLPAppletLauncher\n permet \u00e0 un utilisateur distant malveillant de porter atteinte \u00e0\n l\u0027int\u00e9grit\u00e9 du syst\u00e8me et potentiellement d\u0027ex\u00e9cuter du code\n arbitraire sous la forme d\u0027une appliquette.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"name": "CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"name": "CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"name": "CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"name": "CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"name": "CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:1201 du 06 ao\u00fbt 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-1201.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SA:2009:043 du 07 ao\u00fbt 2009 :",
"url": "http://www.novell.com/linux/security/advisories/2009_43_sunjava.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:1199 du 06 ao\u00fbt 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-1199.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:1236 du 28 ao\u00fbt 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-1236.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM Java du 10 ao\u00fbt 2009 :",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-814-1 du 11 ao\u00fbt 2009 :",
"url": "http://www.ubuntulinux.org/usn/usn-814-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:1200 du 06 ao\u00fbt 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-1200.html"
}
],
"reference": "CERTA-2009-AVI-365",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-09-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans IBM Java permettent \u00e0 un utilisateur\ndistant malintentionn\u00e9 de porter atteinte \u00e0 la confidentialit\u00e9 et \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es, de contourner la politique de s\u00e9curit\u00e9, de\nprovoquer un d\u00e9ni de service ou encore d\u0027ex\u00e9cuter du code arbitraire\navec des privil\u00e8ges \u00e9lev\u00e9s.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans IBM Java",
"vendor_advisories": []
}
CERTA-2009-AVI-365
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités dans IBM Java permettent à un utilisateur distant malintentionné de porter atteinte à la confidentialité et à l'intégrité des données, de contourner la politique de sécurité, de provoquer un déni de service ou encore d'exécuter du code arbitraire avec des privilèges élevés.
Description
- Une vulnérabilité dans le système audio du Java Runtime Environment peut être exploitée afin de porter atteinte à la confidentialité des propriétés du système (CVE-2009-2670) ;
- trois vulnérabilités dans la mise en œuvre du serveur mandataire (proxy) dans Java Runtime Environment permettent à un utilisateur de porter atteinte à la confidentialité des données et d'obtenir un cookie de session de navigation ou de réaliser des connexions non autorisées depuis le système vulnérable (CVE-2009-2671, CVE-2009-2672 et CVE-2009-2673) ;
- une vulnérabilité de type débordement de mémoire permet à un utilisateur de faire exécuter une appliquette Java non-sûre avec des privilèges élevés (CVE-2009-2675).
- une vulnérabilité présente dans l'appliquette JNLPAppletLauncher permet à un utilisateur distant malveillant de porter atteinte à l'intégrité du système et potentiellement d'exécuter du code arbitraire sous la forme d'une appliquette.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Java 5.x :",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Java 6.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\n- Une vuln\u00e9rabilit\u00e9 dans le syst\u00e8me audio du Java Runtime Environment\n peut \u00eatre exploit\u00e9e afin de porter atteinte \u00e0 la confidentialit\u00e9 des\n propri\u00e9t\u00e9s du syst\u00e8me (CVE-2009-2670) ;\n- trois vuln\u00e9rabilit\u00e9s dans la mise en \u0153uvre du serveur mandataire\n (proxy) dans Java Runtime Environment permettent \u00e0 un utilisateur de\n porter atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et d\u0027obtenir un\n cookie de session de navigation ou de r\u00e9aliser des connexions non\n autoris\u00e9es depuis le syst\u00e8me vuln\u00e9rable (CVE-2009-2671,\n CVE-2009-2672 et CVE-2009-2673) ;\n- une vuln\u00e9rabilit\u00e9 de type d\u00e9bordement de m\u00e9moire permet \u00e0 un\n utilisateur de faire ex\u00e9cuter une appliquette Java non-s\u00fbre avec des\n privil\u00e8ges \u00e9lev\u00e9s (CVE-2009-2675).\n- une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans l\u0027appliquette JNLPAppletLauncher\n permet \u00e0 un utilisateur distant malveillant de porter atteinte \u00e0\n l\u0027int\u00e9grit\u00e9 du syst\u00e8me et potentiellement d\u0027ex\u00e9cuter du code\n arbitraire sous la forme d\u0027une appliquette.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"name": "CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"name": "CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"name": "CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"name": "CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"name": "CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:1201 du 06 ao\u00fbt 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-1201.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SA:2009:043 du 07 ao\u00fbt 2009 :",
"url": "http://www.novell.com/linux/security/advisories/2009_43_sunjava.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:1199 du 06 ao\u00fbt 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-1199.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:1236 du 28 ao\u00fbt 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-1236.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM Java du 10 ao\u00fbt 2009 :",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-814-1 du 11 ao\u00fbt 2009 :",
"url": "http://www.ubuntulinux.org/usn/usn-814-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:1200 du 06 ao\u00fbt 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-1200.html"
}
],
"reference": "CERTA-2009-AVI-365",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-09-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans IBM Java permettent \u00e0 un utilisateur\ndistant malintentionn\u00e9 de porter atteinte \u00e0 la confidentialit\u00e9 et \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es, de contourner la politique de s\u00e9curit\u00e9, de\nprovoquer un d\u00e9ni de service ou encore d\u0027ex\u00e9cuter du code arbitraire\navec des privil\u00e8ges \u00e9lev\u00e9s.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans IBM Java",
"vendor_advisories": []
}
CERTA-2010-AVI-043
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités dans les produits VMware permettent, entre autre, l'exécution de code arbitraire à distance.
Description
De multiples vulnérabilités dans les produits VMware permettent, entre autre, l'exécution de code arbitraire à distance. Ces vulnérabilités impactent plus spécifiquement la couche logicielle Java JRE utilisée par certains produits VMware.
Il est à noter que des correctifs ne sont pour l'instant pas disponibles pour toutes les plaformes impactées.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Server 2.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VirtualCenter 2.0.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESX 3.0.3 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESX 3.5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VirtualCenter 2.5 ant\u00e9rieur \u00e0 Update 6 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "vMA 4.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESX 4.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "vCenter 4.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s dans les produits VMware permettent, entre\nautre, l\u0027ex\u00e9cution de code arbitraire \u00e0 distance. Ces vuln\u00e9rabilit\u00e9s\nimpactent plus sp\u00e9cifiquement la couche logicielle Java JRE utilis\u00e9e par\ncertains produits VMware.\n\nIl est \u00e0 noter que des correctifs ne sont pour l\u0027instant pas disponibles\npour toutes les plaformes impact\u00e9es.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-3877",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3877"
},
{
"name": "CVE-2009-2724",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2724"
},
{
"name": "CVE-2009-2721",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2721"
},
{
"name": "CVE-2009-1106",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1106"
},
{
"name": "CVE-2009-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1104"
},
{
"name": "CVE-2009-3871",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3871"
},
{
"name": "CVE-2009-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1101"
},
{
"name": "CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"name": "CVE-2009-3884",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3884"
},
{
"name": "CVE-2009-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2719"
},
{
"name": "CVE-2009-3867",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3867"
},
{
"name": "CVE-2009-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
},
{
"name": "CVE-2009-3882",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3882"
},
{
"name": "CVE-2009-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1095"
},
{
"name": "CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"name": "CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"name": "CVE-2009-1102",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1102"
},
{
"name": "CVE-2009-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3872"
},
{
"name": "CVE-2009-2720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2720"
},
{
"name": "CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"name": "CVE-2009-3864",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3864"
},
{
"name": "CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"name": "CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"name": "CVE-2009-3883",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3883"
},
{
"name": "CVE-2009-3728",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3728"
},
{
"name": "CVE-2009-1099",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1099"
},
{
"name": "CVE-2009-3881",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3881"
},
{
"name": "CVE-2009-3876",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3876"
},
{
"name": "CVE-2009-3885",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3885"
},
{
"name": "CVE-2009-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3875"
},
{
"name": "CVE-2009-2723",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2723"
},
{
"name": "CVE-2009-1107",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1107"
},
{
"name": "CVE-2009-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2716"
},
{
"name": "CVE-2009-3869",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3869"
},
{
"name": "CVE-2009-1105",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1105"
},
{
"name": "CVE-2009-3873",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3873"
},
{
"name": "CVE-2009-2722",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2722"
},
{
"name": "CVE-2009-3886",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3886"
},
{
"name": "CVE-2009-1103",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1103"
},
{
"name": "CVE-2009-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3874"
},
{
"name": "CVE-2009-1100",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1100"
},
{
"name": "CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"name": "CVE-2009-3879",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3879"
},
{
"name": "CVE-2009-3729",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3729"
},
{
"name": "CVE-2009-1096",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1096"
},
{
"name": "CVE-2009-1098",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1098"
},
{
"name": "CVE-2009-3868",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3868"
},
{
"name": "CVE-2009-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1097"
},
{
"name": "CVE-2009-3865",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3865"
},
{
"name": "CVE-2009-3880",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3880"
},
{
"name": "CVE-2009-2718",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2718"
},
{
"name": "CVE-2009-3866",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3866"
},
{
"name": "CVE-2009-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1093"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2010-0002 du 29 janvier 2010 :",
"url": "http://www.vmware.com/security/advisories/VMSA-2010-0002.html"
}
],
"reference": "CERTA-2010-AVI-043",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-02-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s dans les produits VMware permettent, entre\nautre, l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2010-0002 du 29 janvier 2010",
"url": null
}
]
}
CERTA-2010-AVI-043
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités dans les produits VMware permettent, entre autre, l'exécution de code arbitraire à distance.
Description
De multiples vulnérabilités dans les produits VMware permettent, entre autre, l'exécution de code arbitraire à distance. Ces vulnérabilités impactent plus spécifiquement la couche logicielle Java JRE utilisée par certains produits VMware.
Il est à noter que des correctifs ne sont pour l'instant pas disponibles pour toutes les plaformes impactées.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Server 2.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VirtualCenter 2.0.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESX 3.0.3 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESX 3.5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VirtualCenter 2.5 ant\u00e9rieur \u00e0 Update 6 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "vMA 4.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESX 4.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "vCenter 4.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s dans les produits VMware permettent, entre\nautre, l\u0027ex\u00e9cution de code arbitraire \u00e0 distance. Ces vuln\u00e9rabilit\u00e9s\nimpactent plus sp\u00e9cifiquement la couche logicielle Java JRE utilis\u00e9e par\ncertains produits VMware.\n\nIl est \u00e0 noter que des correctifs ne sont pour l\u0027instant pas disponibles\npour toutes les plaformes impact\u00e9es.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-3877",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3877"
},
{
"name": "CVE-2009-2724",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2724"
},
{
"name": "CVE-2009-2721",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2721"
},
{
"name": "CVE-2009-1106",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1106"
},
{
"name": "CVE-2009-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1104"
},
{
"name": "CVE-2009-3871",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3871"
},
{
"name": "CVE-2009-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1101"
},
{
"name": "CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"name": "CVE-2009-3884",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3884"
},
{
"name": "CVE-2009-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2719"
},
{
"name": "CVE-2009-3867",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3867"
},
{
"name": "CVE-2009-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
},
{
"name": "CVE-2009-3882",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3882"
},
{
"name": "CVE-2009-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1095"
},
{
"name": "CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"name": "CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"name": "CVE-2009-1102",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1102"
},
{
"name": "CVE-2009-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3872"
},
{
"name": "CVE-2009-2720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2720"
},
{
"name": "CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"name": "CVE-2009-3864",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3864"
},
{
"name": "CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"name": "CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"name": "CVE-2009-3883",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3883"
},
{
"name": "CVE-2009-3728",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3728"
},
{
"name": "CVE-2009-1099",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1099"
},
{
"name": "CVE-2009-3881",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3881"
},
{
"name": "CVE-2009-3876",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3876"
},
{
"name": "CVE-2009-3885",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3885"
},
{
"name": "CVE-2009-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3875"
},
{
"name": "CVE-2009-2723",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2723"
},
{
"name": "CVE-2009-1107",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1107"
},
{
"name": "CVE-2009-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2716"
},
{
"name": "CVE-2009-3869",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3869"
},
{
"name": "CVE-2009-1105",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1105"
},
{
"name": "CVE-2009-3873",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3873"
},
{
"name": "CVE-2009-2722",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2722"
},
{
"name": "CVE-2009-3886",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3886"
},
{
"name": "CVE-2009-1103",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1103"
},
{
"name": "CVE-2009-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3874"
},
{
"name": "CVE-2009-1100",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1100"
},
{
"name": "CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"name": "CVE-2009-3879",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3879"
},
{
"name": "CVE-2009-3729",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3729"
},
{
"name": "CVE-2009-1096",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1096"
},
{
"name": "CVE-2009-1098",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1098"
},
{
"name": "CVE-2009-3868",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3868"
},
{
"name": "CVE-2009-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1097"
},
{
"name": "CVE-2009-3865",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3865"
},
{
"name": "CVE-2009-3880",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3880"
},
{
"name": "CVE-2009-2718",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2718"
},
{
"name": "CVE-2009-3866",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3866"
},
{
"name": "CVE-2009-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1093"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2010-0002 du 29 janvier 2010 :",
"url": "http://www.vmware.com/security/advisories/VMSA-2010-0002.html"
}
],
"reference": "CERTA-2010-AVI-043",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-02-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s dans les produits VMware permettent, entre\nautre, l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2010-0002 du 29 janvier 2010",
"url": null
}
]
}
CERTA-2009-AVI-513
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités découvertes dans les produits VMware peuvent être exploitées à distance par un utilisateur malintentionné afin de compromettre le système vulnérable ou encore d'entraver son bon fonctionnement.
Description
Les vulnérabilités présentes dans les produits VMware peuvent être exploitées afin de porter atteinte à l'intégrité et à la confidentialité des données, de réaliser un déni de service, d'injecter et d'exécuter indirectement du code arbitraire, d'élever ses privilèges ou d'exécuter du code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | VMware Server 2.x ; | ||
| VMware | ESXi | VMware ESXi 3.x ; | ||
| VMware | N/A | VMware vMA 4.x. | ||
| VMware | N/A | VMware ESX Server 4.x ; | ||
| VMware | N/A | VMware ESX Server 2.x ; | ||
| VMware | N/A | VMware ESX Server 3.x ; | ||
| VMware | ESXi | VMware ESXi 4.x ; | ||
| VMware | vCenter Server | VMware vCenter Server 4.x ; | ||
| VMware | N/A | VMware VirtualCenter 2.x ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 3.x ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vMA 4.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 4.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 3.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 4.x ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCenter Server 4.x ;",
"product": {
"name": "vCenter Server",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware VirtualCenter 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLes vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans les produits VMware peuvent \u00eatre\nexploit\u00e9es afin de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9 et \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, de r\u00e9aliser un d\u00e9ni de service, d\u0027injecter et d\u0027ex\u00e9cuter\nindirectement du code arbitraire, d\u0027\u00e9lever ses privil\u00e8ges ou d\u0027ex\u00e9cuter\ndu code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2724",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2724"
},
{
"name": "CVE-2009-0676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0676"
},
{
"name": "CVE-2009-2721",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2721"
},
{
"name": "CVE-2008-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3143"
},
{
"name": "CVE-2009-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2692"
},
{
"name": "CVE-2009-2406",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2406"
},
{
"name": "CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"name": "CVE-2008-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0002"
},
{
"name": "CVE-2009-1106",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1106"
},
{
"name": "CVE-2009-1072",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1072"
},
{
"name": "CVE-2008-4307",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
},
{
"name": "CVE-2009-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1104"
},
{
"name": "CVE-2009-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2407"
},
{
"name": "CVE-2008-3142",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3142"
},
{
"name": "CVE-2009-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1101"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2009-1385",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
},
{
"name": "CVE-2009-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0746"
},
{
"name": "CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"name": "CVE-2007-5966",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
},
{
"name": "CVE-2009-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2719"
},
{
"name": "CVE-2008-4864",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4864"
},
{
"name": "CVE-2009-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2417"
},
{
"name": "CVE-2009-1439",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1439"
},
{
"name": "CVE-2009-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0322"
},
{
"name": "CVE-2009-1895",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
},
{
"name": "CVE-2009-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
},
{
"name": "CVE-2009-0748",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0748"
},
{
"name": "CVE-2008-3144",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3144"
},
{
"name": "CVE-2009-0747",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0747"
},
{
"name": "CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"name": "CVE-2009-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1095"
},
{
"name": "CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"name": "CVE-2009-0675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0675"
},
{
"name": "CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"name": "CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"name": "CVE-2009-1102",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1102"
},
{
"name": "CVE-2009-1630",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1630"
},
{
"name": "CVE-2009-0269",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0269"
},
{
"name": "CVE-2008-3528",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3528"
},
{
"name": "CVE-2008-5031",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5031"
},
{
"name": "CVE-2008-1721",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1721"
},
{
"name": "CVE-2009-1388",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1388"
},
{
"name": "CVE-2009-1192",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1192"
},
{
"name": "CVE-2009-2720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2720"
},
{
"name": "CVE-2009-0834",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
},
{
"name": "CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"name": "CVE-2009-2848",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2848"
},
{
"name": "CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"name": "CVE-2008-1232",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
},
{
"name": "CVE-2009-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0159"
},
{
"name": "CVE-2009-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0778"
},
{
"name": "CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"name": "CVE-2009-1099",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1099"
},
{
"name": "CVE-2009-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1252"
},
{
"name": "CVE-2009-2698",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2698"
},
{
"name": "CVE-2008-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
},
{
"name": "CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"name": "CVE-2009-2723",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2723"
},
{
"name": "CVE-2009-1107",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1107"
},
{
"name": "CVE-2009-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2716"
},
{
"name": "CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"name": "CVE-2008-1947",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1947"
},
{
"name": "CVE-2009-1105",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1105"
},
{
"name": "CVE-2007-6286",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6286"
},
{
"name": "CVE-2009-0028",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0028"
},
{
"name": "CVE-2009-1337",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
},
{
"name": "CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2007-2052",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2052"
},
{
"name": "CVE-2009-1336",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1336"
},
{
"name": "CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"name": "CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"name": "CVE-2007-4965",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4965"
},
{
"name": "CVE-2009-1633",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1633"
},
{
"name": "CVE-2009-2722",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2722"
},
{
"name": "CVE-2008-5700",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5700"
},
{
"name": "CVE-2009-1103",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1103"
},
{
"name": "CVE-2009-1100",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1100"
},
{
"name": "CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"name": "CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"name": "CVE-2009-1096",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1096"
},
{
"name": "CVE-2009-1098",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1098"
},
{
"name": "CVE-2009-0787",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0787"
},
{
"name": "CVE-2008-1887",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1887"
},
{
"name": "CVE-2009-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1097"
},
{
"name": "CVE-2009-2847",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2847"
},
{
"name": "CVE-2008-2315",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2315"
},
{
"name": "CVE-2009-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0696"
},
{
"name": "CVE-2009-2718",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2718"
},
{
"name": "CVE-2009-0745",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0745"
},
{
"name": "CVE-2009-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1093"
}
],
"links": [],
"reference": "CERTA-2009-AVI-513",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-11-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans les produits VMware peuvent\n\u00eatre exploit\u00e9es \u00e0 distance par un utilisateur malintentionn\u00e9 afin de\ncompromettre le syst\u00e8me vuln\u00e9rable ou encore d\u0027entraver son bon\nfonctionnement.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware du 20 novembre 2009",
"url": "http://lists.vmware.com/pipermail/security-announce/2009/000070.html"
}
]
}
CERTA-2009-AVI-513
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités découvertes dans les produits VMware peuvent être exploitées à distance par un utilisateur malintentionné afin de compromettre le système vulnérable ou encore d'entraver son bon fonctionnement.
Description
Les vulnérabilités présentes dans les produits VMware peuvent être exploitées afin de porter atteinte à l'intégrité et à la confidentialité des données, de réaliser un déni de service, d'injecter et d'exécuter indirectement du code arbitraire, d'élever ses privilèges ou d'exécuter du code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | VMware Server 2.x ; | ||
| VMware | ESXi | VMware ESXi 3.x ; | ||
| VMware | N/A | VMware vMA 4.x. | ||
| VMware | N/A | VMware ESX Server 4.x ; | ||
| VMware | N/A | VMware ESX Server 2.x ; | ||
| VMware | N/A | VMware ESX Server 3.x ; | ||
| VMware | ESXi | VMware ESXi 4.x ; | ||
| VMware | vCenter Server | VMware vCenter Server 4.x ; | ||
| VMware | N/A | VMware VirtualCenter 2.x ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 3.x ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vMA 4.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 4.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 3.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 4.x ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware vCenter Server 4.x ;",
"product": {
"name": "vCenter Server",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware VirtualCenter 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLes vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans les produits VMware peuvent \u00eatre\nexploit\u00e9es afin de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9 et \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, de r\u00e9aliser un d\u00e9ni de service, d\u0027injecter et d\u0027ex\u00e9cuter\nindirectement du code arbitraire, d\u0027\u00e9lever ses privil\u00e8ges ou d\u0027ex\u00e9cuter\ndu code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2724",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2724"
},
{
"name": "CVE-2009-0676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0676"
},
{
"name": "CVE-2009-2721",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2721"
},
{
"name": "CVE-2008-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3143"
},
{
"name": "CVE-2009-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2692"
},
{
"name": "CVE-2009-2406",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2406"
},
{
"name": "CVE-2009-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
},
{
"name": "CVE-2008-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0002"
},
{
"name": "CVE-2009-1106",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1106"
},
{
"name": "CVE-2009-1072",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1072"
},
{
"name": "CVE-2008-4307",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
},
{
"name": "CVE-2009-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1104"
},
{
"name": "CVE-2009-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2407"
},
{
"name": "CVE-2008-3142",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3142"
},
{
"name": "CVE-2009-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1101"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2009-1385",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
},
{
"name": "CVE-2009-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0746"
},
{
"name": "CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"name": "CVE-2007-5966",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
},
{
"name": "CVE-2009-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2719"
},
{
"name": "CVE-2008-4864",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4864"
},
{
"name": "CVE-2009-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2417"
},
{
"name": "CVE-2009-1439",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1439"
},
{
"name": "CVE-2009-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0322"
},
{
"name": "CVE-2009-1895",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
},
{
"name": "CVE-2009-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
},
{
"name": "CVE-2009-0748",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0748"
},
{
"name": "CVE-2008-3144",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3144"
},
{
"name": "CVE-2009-0747",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0747"
},
{
"name": "CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"name": "CVE-2009-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1095"
},
{
"name": "CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"name": "CVE-2009-0675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0675"
},
{
"name": "CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"name": "CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"name": "CVE-2009-1102",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1102"
},
{
"name": "CVE-2009-1630",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1630"
},
{
"name": "CVE-2009-0269",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0269"
},
{
"name": "CVE-2008-3528",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3528"
},
{
"name": "CVE-2008-5031",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5031"
},
{
"name": "CVE-2008-1721",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1721"
},
{
"name": "CVE-2009-1388",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1388"
},
{
"name": "CVE-2009-1192",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1192"
},
{
"name": "CVE-2009-2720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2720"
},
{
"name": "CVE-2009-0834",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
},
{
"name": "CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"name": "CVE-2009-2848",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2848"
},
{
"name": "CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"name": "CVE-2008-1232",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
},
{
"name": "CVE-2009-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0159"
},
{
"name": "CVE-2009-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0778"
},
{
"name": "CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"name": "CVE-2009-1099",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1099"
},
{
"name": "CVE-2009-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1252"
},
{
"name": "CVE-2009-2698",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2698"
},
{
"name": "CVE-2008-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
},
{
"name": "CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"name": "CVE-2009-2723",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2723"
},
{
"name": "CVE-2009-1107",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1107"
},
{
"name": "CVE-2009-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2716"
},
{
"name": "CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"name": "CVE-2008-1947",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1947"
},
{
"name": "CVE-2009-1105",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1105"
},
{
"name": "CVE-2007-6286",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6286"
},
{
"name": "CVE-2009-0028",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0028"
},
{
"name": "CVE-2009-1337",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
},
{
"name": "CVE-2009-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2007-2052",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2052"
},
{
"name": "CVE-2009-1336",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1336"
},
{
"name": "CVE-2009-0783",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
},
{
"name": "CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"name": "CVE-2007-4965",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4965"
},
{
"name": "CVE-2009-1633",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1633"
},
{
"name": "CVE-2009-2722",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2722"
},
{
"name": "CVE-2008-5700",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5700"
},
{
"name": "CVE-2009-1103",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1103"
},
{
"name": "CVE-2009-1100",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1100"
},
{
"name": "CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"name": "CVE-2007-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
},
{
"name": "CVE-2009-1096",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1096"
},
{
"name": "CVE-2009-1098",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1098"
},
{
"name": "CVE-2009-0787",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0787"
},
{
"name": "CVE-2008-1887",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1887"
},
{
"name": "CVE-2009-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1097"
},
{
"name": "CVE-2009-2847",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2847"
},
{
"name": "CVE-2008-2315",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2315"
},
{
"name": "CVE-2009-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0696"
},
{
"name": "CVE-2009-2718",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2718"
},
{
"name": "CVE-2009-0745",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0745"
},
{
"name": "CVE-2009-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1093"
}
],
"links": [],
"reference": "CERTA-2009-AVI-513",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-11-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans les produits VMware peuvent\n\u00eatre exploit\u00e9es \u00e0 distance par un utilisateur malintentionn\u00e9 afin de\ncompromettre le syst\u00e8me vuln\u00e9rable ou encore d\u0027entraver son bon\nfonctionnement.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware du 20 novembre 2009",
"url": "http://lists.vmware.com/pipermail/security-announce/2009/000070.html"
}
]
}
FKIE_CVE-2009-2672
Vulnerability from fkie_nvd - Published: 2009-08-05 19:30 - Updated: 2025-04-09 00:30| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20 | ||
| cve@mitre.org | http://java.sun.com/javase/6/webnotes/6u15.html | ||
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html | ||
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html | ||
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html | ||
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html | ||
| cve@mitre.org | http://marc.info/?l=bugtraq&m=125787273209737&w=2 | ||
| cve@mitre.org | http://secunia.com/advisories/36176 | ||
| cve@mitre.org | http://secunia.com/advisories/36180 | ||
| cve@mitre.org | http://secunia.com/advisories/36199 | ||
| cve@mitre.org | http://secunia.com/advisories/36248 | ||
| cve@mitre.org | http://secunia.com/advisories/37300 | ||
| cve@mitre.org | http://secunia.com/advisories/37386 | ||
| cve@mitre.org | http://secunia.com/advisories/37460 | ||
| cve@mitre.org | http://security.gentoo.org/glsa/glsa-200911-02.xml | ||
| cve@mitre.org | http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1 | Patch, Vendor Advisory | |
| cve@mitre.org | http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1 | Patch, Vendor Advisory | |
| cve@mitre.org | http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html | ||
| cve@mitre.org | http://www.securityfocus.com/archive/1/507985/100/0/threaded | ||
| cve@mitre.org | http://www.securityfocus.com/bid/35943 | ||
| cve@mitre.org | http://www.securitytracker.com/id?1022659 | ||
| cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA09-294A.html | US Government Resource | |
| cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2009-0016.html | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2009/2543 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2009/3316 | ||
| cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/52337 | ||
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7723 | ||
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9359 | ||
| cve@mitre.org | https://rhn.redhat.com/errata/RHSA-2009-1199.html | ||
| cve@mitre.org | https://rhn.redhat.com/errata/RHSA-2009-1200.html | ||
| cve@mitre.org | https://rhn.redhat.com/errata/RHSA-2009-1201.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://java.sun.com/javase/6/webnotes/6u15.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=125787273209737&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36176 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36180 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36199 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36248 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37300 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37386 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37460 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200911-02.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/507985/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/35943 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1022659 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA09-294A.html | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2009-0016.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/2543 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3316 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/52337 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7723 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9359 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://rhn.redhat.com/errata/RHSA-2009-1199.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://rhn.redhat.com/errata/RHSA-2009-1200.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://rhn.redhat.com/errata/RHSA-2009-1201.html |
| Vendor | Product | Version | |
|---|---|---|---|
| sun | jdk | * | |
| sun | jdk | 5.0 | |
| sun | jdk | 5.0 | |
| sun | jdk | 5.0 | |
| sun | jdk | 5.0 | |
| sun | jdk | 5.0 | |
| sun | jdk | 5.0 | |
| sun | jdk | 5.0 | |
| sun | jdk | 5.0 | |
| sun | jdk | 5.0 | |
| sun | jdk | 5.0 | |
| sun | jdk | 5.0 | |
| sun | jdk | 5.0 | |
| sun | jdk | 5.0 | |
| sun | jdk | 5.0 | |
| sun | jdk | 5.0 | |
| sun | jdk | 5.0 | |
| sun | jdk | 5.0 | |
| sun | jdk | 6 | |
| sun | jdk | 6 | |
| sun | jdk | 6 | |
| sun | jdk | 6 | |
| sun | jdk | 6 | |
| sun | jdk | 6 | |
| sun | jdk | 6 | |
| sun | jdk | 6 | |
| sun | jdk | 6 | |
| sun | jdk | 6 | |
| sun | jdk | 6 | |
| sun | jdk | 6 | |
| sun | jre | * | |
| sun | jre | 5.0 | |
| sun | jre | 5.0 | |
| sun | jre | 5.0 | |
| sun | jre | 5.0 | |
| sun | jre | 5.0 | |
| sun | jre | 5.0 | |
| sun | jre | 5.0 | |
| sun | jre | 5.0 | |
| sun | jre | 5.0 | |
| sun | jre | 5.0 | |
| sun | jre | 5.0 | |
| sun | jre | 5.0 | |
| sun | jre | 5.0 | |
| sun | jre | 5.0 | |
| sun | jre | 5.0 | |
| sun | jre | 5.0 | |
| sun | jre | 5.0 | |
| sun | jre | 5.0 | |
| sun | jre | 6 | |
| sun | jre | 6 | |
| sun | jre | 6 | |
| sun | jre | 6 | |
| sun | jre | 6 | |
| sun | jre | 6 | |
| sun | jre | 6 | |
| sun | jre | 6 | |
| sun | jre | 6 | |
| sun | jre | 6 | |
| sun | jre | 6 | |
| sun | jre | 6 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sun:jdk:*:update_13:*:*:*:*:*:*",
"matchCriteriaId": "E6AF4AEB-CB27-4AAB-B4A9-CC65EC831D77",
"versionEndIncluding": "6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*",
"matchCriteriaId": "6BB00A29-FEBB-4139-9E96-691EC1410EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*",
"matchCriteriaId": "DD8CC179-F76E-4CC2-9CBD-69CBBA5BD532",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*",
"matchCriteriaId": "C2DC7389-9697-4EF0-9C4E-153731CDD75D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*",
"matchCriteriaId": "C5F476C8-5466-4E6B-B73B-4ACFBB02AD5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*",
"matchCriteriaId": "D8C7C8C1-AA0D-4BD9-A8EC-85BBE627DE13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*",
"matchCriteriaId": "BAF0844B-ECB1-4AF0-AA32-1B8789AC5042",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:*",
"matchCriteriaId": "0EFEB813-B20D-4C8B-922D-0603CB93F72A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:5.0:update_16:*:*:*:*:*:*",
"matchCriteriaId": "41CE5B2D-5594-4026-BABF-CBE485764D8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:5.0:update_17:*:*:*:*:*:*",
"matchCriteriaId": "DFB84BBA-D93E-4517-BA7A-FCFB860736CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*",
"matchCriteriaId": "25322D24-C5D9-43A6-87CC-1BF7FA6A3E76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*",
"matchCriteriaId": "400FDCDE-16DE-4BD6-81E2-4A5DA12E99CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*",
"matchCriteriaId": "82C49C78-ACE3-407D-AE21-EA180633C437",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*",
"matchCriteriaId": "5F91F8A2-D473-48DC-81DA-21291DE7B6E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*",
"matchCriteriaId": "3E46B3B4-9E1C-4C87-A4CD-C4CE7FBCA7F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*",
"matchCriteriaId": "0F69C703-8541-4AA8-A66A-0292E0FCB749",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*",
"matchCriteriaId": "99E08AB2-49AD-42C6-967F-773F2C6E188A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*",
"matchCriteriaId": "9459F130-A3DD-4A4E-9582-4FB82619EB5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*",
"matchCriteriaId": "9C9F6EA8-6A88-4485-89A3-0FDF84AB51DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:6:update_10:*:*:*:*:*:*",
"matchCriteriaId": "D7680A8A-EC07-4819-A93C-B8EBF8B1199F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:6:update_11:*:*:*:*:*:*",
"matchCriteriaId": "FA89349B-834C-42D0-84C6-CA73CE1F8B26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:6:update_12:*:*:*:*:*:*",
"matchCriteriaId": "B7865369-9DE6-4C20-ACD2-CCC14ED54701",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*",
"matchCriteriaId": "67E0818A-3675-4293-89FE-5001E36C0F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*",
"matchCriteriaId": "95112B98-B6B2-43FA-BF76-F518649CF3BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*",
"matchCriteriaId": "3A18341A-3688-48E7-95AD-283EC9C95B4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*",
"matchCriteriaId": "E301C59A-47F5-4861-9091-D0002CBA5B7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:6:update_6:*:*:*:*:*:*",
"matchCriteriaId": "BCD4F889-710C-43C5-85DD-70E96F8FE313",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:6:update_7:*:*:*:*:*:*",
"matchCriteriaId": "ED195051-AAC7-4EE1-B936-18D1C8AD2498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:6:update_8:*:*:*:*:*:*",
"matchCriteriaId": "44146DF6-F368-4F17-B379-34194873D80F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jdk:6:update_9:*:*:*:*:*:*",
"matchCriteriaId": "18B70D77-F631-47D8-95A5-1D3A7E8BF63B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:*:update_13:*:*:*:*:*:*",
"matchCriteriaId": "C150A6B7-9C4C-46E4-99B6-792A0D326E84",
"versionEndIncluding": "6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*",
"matchCriteriaId": "2A2379FC-BC33-4C90-97DD-ED3723172008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*",
"matchCriteriaId": "86A1256D-7A34-4FDD-9536-82FD6497A712",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*",
"matchCriteriaId": "3BB5E47A-8C17-4995-9EF8-01BFA0B702B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*",
"matchCriteriaId": "9300FA38-C234-4BD8-ADB6-D2A29EBA81DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*",
"matchCriteriaId": "C87F6EE3-F66B-4F15-89BA-26A4D3AD2556",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*",
"matchCriteriaId": "56F0F497-6586-408B-80AF-6BC2B9909397",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:5.0:update_15:*:*:*:*:*:*",
"matchCriteriaId": "1E022C6E-20DE-4124-9CA3-11400E13A05A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:5.0:update_16:*:*:*:*:*:*",
"matchCriteriaId": "5A34B1CB-EE08-48BB-BEC1-0720801DA0D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:5.0:update_17:*:*:*:*:*:*",
"matchCriteriaId": "57E2C9F7-ACD1-4A89-AB18-ADF595995772",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:5.0:update_19:*:*:*:*:*:*",
"matchCriteriaId": "89041A24-8354-410B-8026-875CC1791565",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*",
"matchCriteriaId": "D594E269-D722-45FC-B390-B0D38ADEC923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*",
"matchCriteriaId": "3CAA89D6-651A-4B8C-A134-C3A2CB84002A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*",
"matchCriteriaId": "B930EAFB-F2E6-4FCA-A21B-022656396A2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*",
"matchCriteriaId": "4B20EB5F-D12A-4267-9887-C39A188EB9AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*",
"matchCriteriaId": "52347FDC-9983-4A64-8031-B4A50DDC9BBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*",
"matchCriteriaId": "C95654B3-ACA0-4B0D-9F31-B9C5FB7B9C96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*",
"matchCriteriaId": "8387A041-582A-4010-9C44-672090F41A72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*",
"matchCriteriaId": "D1F2D335-CDDF-4D2E-80CA-F1A0AF92501A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*",
"matchCriteriaId": "0F98D2BD-2AC1-4C4C-8A10-71093DCBC4E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:6:update_10:*:*:*:*:*:*",
"matchCriteriaId": "2D6FCAFC-F41C-4C6F-9EA4-46AEFF65CC5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:6:update_11:*:*:*:*:*:*",
"matchCriteriaId": "8BA9E6CD-F43F-487D-9638-406B72D51471",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:6:update_12:*:*:*:*:*:*",
"matchCriteriaId": "9D2F4664-E158-45ED-81B6-D8371F1C6B9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*",
"matchCriteriaId": "CDC09958-5286-4C16-AB6F-63B4BDD902B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*",
"matchCriteriaId": "BDE1E9E9-85EF-4ACA-902B-00225EB4324F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*",
"matchCriteriaId": "E0CDBFCB-42EA-4F19-A98D-7696B0D526CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*",
"matchCriteriaId": "53DCFF2A-77A7-41DB-A712-9B6D1FD2574A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:6:update_6:*:*:*:*:*:*",
"matchCriteriaId": "82C6F76F-68FD-4794-9182-935D85910C1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:6:update_7:*:*:*:*:*:*",
"matchCriteriaId": "6314C9DF-9421-445D-ABCC-79EDCED23156",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:6:update_8:*:*:*:*:*:*",
"matchCriteriaId": "533670FA-B8DC-40B4-ADC1-CCD70E4A43A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sun:jre:6:update_9:*:*:*:*:*:*",
"matchCriteriaId": "119B72FA-8B85-4D1F-8A14-5B07204DAED5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors."
},
{
"lang": "es",
"value": "El mecanismo proxy implementado en Sun Java Runtime Environment (JRE) en JDK y JRE v6 anterior Update v15, y JDK y JRE v5.0 anterior Update v20, no previene el acceso a las cookies del buscador por (1) applets y (2) aplicaciones Java Web Start no confiables, que permiten a atacantes remotos secuestrar las sesiones web a trav\u00e9s de vectores no especificados."
}
],
"id": "CVE-2009-2672",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-08-05T19:30:01.217",
"references": [
{
"source": "cve@mitre.org",
"url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20"
},
{
"source": "cve@mitre.org",
"url": "http://java.sun.com/javase/6/webnotes/6u15.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/36176"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/36180"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/36199"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/36248"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/37300"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/37386"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/37460"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-200911-02.xml"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1"
},
{
"source": "cve@mitre.org",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/35943"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1022659"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2009/2543"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52337"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7723"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9359"
},
{
"source": "cve@mitre.org",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html"
},
{
"source": "cve@mitre.org",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html"
},
{
"source": "cve@mitre.org",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://java.sun.com/javase/6/webnotes/6u15.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/36176"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/36180"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/36199"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/36248"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/37300"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/37386"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/37460"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200911-02.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/35943"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1022659"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/2543"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52337"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7723"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9359"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2009-2672
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2009-2672",
"description": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"id": "GSD-2009-2672",
"references": [
"https://www.suse.com/security/cve/CVE-2009-2672.html",
"https://access.redhat.com/errata/RHSA-2010:0043",
"https://access.redhat.com/errata/RHSA-2009:1662",
"https://access.redhat.com/errata/RHSA-2009:1582",
"https://access.redhat.com/errata/RHSA-2009:1236",
"https://access.redhat.com/errata/RHSA-2009:1201",
"https://access.redhat.com/errata/RHSA-2009:1200",
"https://access.redhat.com/errata/RHSA-2009:1199",
"https://linux.oracle.com/cve/CVE-2009-2672.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2009-2672"
],
"details": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"id": "GSD-2009-2672",
"modified": "2023-12-13T01:19:46.677027Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-2672",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2009:1200",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html"
},
{
"name": "RHSA-2009:1199",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html"
},
{
"name": "ADV-2009-2543",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/2543"
},
{
"name": "37460",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37460"
},
{
"name": "GLSA-200911-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200911-02.xml"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "HPSBUX02476",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"name": "36199",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36199"
},
{
"name": "36248",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36248"
},
{
"name": "oval:org.mitre.oval:def:7723",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7723"
},
{
"name": "SSRT090250",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"name": "http://java.sun.com/javase/6/webnotes/6u15.html",
"refsource": "CONFIRM",
"url": "http://java.sun.com/javase/6/webnotes/6u15.html"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "TA09-294A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"name": "35943",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35943"
},
{
"name": "oval:org.mitre.oval:def:9359",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9359"
},
{
"name": "36180",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36180"
},
{
"name": "sun-jre-proxy-session-hijacking(52337)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52337"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
},
{
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1",
"refsource": "CONFIRM",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
},
{
"name": "263409",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1"
},
{
"name": "36176",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36176"
},
{
"name": "1022659",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022659"
},
{
"name": "SUSE-SR:2009:016",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html"
},
{
"name": "37300",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37300"
},
{
"name": "APPLE-SA-2009-09-03-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
},
{
"name": "SUSE-SA:2009:053",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
},
{
"name": "RHSA-2009:1201",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html"
},
{
"name": "SUSE-SA:2009:043",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html"
},
{
"name": "37386",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37386"
},
{
"name": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20",
"refsource": "CONFIRM",
"url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20"
},
{
"name": "ADV-2009-3316",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3316"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:6:update_10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:6:update_7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:6:update_8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:*:update_13:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_15:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_19:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:6:update_11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:6:update_9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:6:update_6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:6:update_7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:6:update_10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:6:update_11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:6:update_8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:6:update_9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_16:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_17:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_16:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:6:update_6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:6:update_12:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:6:update_12:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:*:update_13:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_17:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-2672"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "263409",
"refsource": "SUNALERT",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1"
},
{
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
},
{
"name": "1022659",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1022659"
},
{
"name": "36199",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/36199"
},
{
"name": "RHSA-2009:1200",
"refsource": "REDHAT",
"tags": [],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html"
},
{
"name": "RHSA-2009:1201",
"refsource": "REDHAT",
"tags": [],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html"
},
{
"name": "36248",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/36248"
},
{
"name": "36180",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/36180"
},
{
"name": "35943",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/35943"
},
{
"name": "http://java.sun.com/javase/6/webnotes/6u15.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://java.sun.com/javase/6/webnotes/6u15.html"
},
{
"name": "RHSA-2009:1199",
"refsource": "REDHAT",
"tags": [],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html"
},
{
"name": "SUSE-SA:2009:043",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html"
},
{
"name": "36176",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/36176"
},
{
"name": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20",
"refsource": "CONFIRM",
"tags": [],
"url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20"
},
{
"name": "APPLE-SA-2009-09-03-1",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
},
{
"name": "ADV-2009-2543",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/2543"
},
{
"name": "SUSE-SR:2009:016",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html"
},
{
"name": "TA09-294A",
"refsource": "CERT",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"name": "SUSE-SA:2009:053",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
},
{
"name": "GLSA-200911-02",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200911-02.xml"
},
{
"name": "37300",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/37300"
},
{
"name": "HPSBUX02476",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"name": "37386",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/37386"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "ADV-2009-3316",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"name": "37460",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/37460"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
},
{
"name": "sun-jre-proxy-session-hijacking(52337)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52337"
},
{
"name": "oval:org.mitre.oval:def:9359",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9359"
},
{
"name": "oval:org.mitre.oval:def:7723",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7723"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-10T19:41Z",
"publishedDate": "2009-08-05T19:30Z"
}
}
}
GHSA-FJ22-5G9H-44W5
Vulnerability from github – Published: 2022-05-02 03:37 – Updated: 2022-05-02 03:37The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
{
"affected": [],
"aliases": [
"CVE-2009-2672"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2009-08-05T19:30:00Z",
"severity": "HIGH"
},
"details": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"id": "GHSA-fj22-5g9h-44w5",
"modified": "2022-05-02T03:37:33Z",
"published": "2022-05-02T03:37:33Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52337"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7723"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9359"
},
{
"type": "WEB",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html"
},
{
"type": "WEB",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html"
},
{
"type": "WEB",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html"
},
{
"type": "WEB",
"url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20"
},
{
"type": "WEB",
"url": "http://java.sun.com/javase/6/webnotes/6u15.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36176"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36180"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36199"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36248"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/37300"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/37386"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/37460"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200911-02.xml"
},
{
"type": "WEB",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
},
{
"type": "WEB",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/35943"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1022659"
},
{
"type": "WEB",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"type": "WEB",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/2543"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/3316"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.