Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2008-3111
Vulnerability from cvelistv5
Published
2008-07-09 23:00
Modified
2024-08-07 09:28
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:28:40.707Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2008-09-24", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html" }, { "name": "20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=122331139823057\u0026w=2" }, { "name": "31600", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31600" }, { "name": "SUSE-SA:2008:042", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html" }, { "name": "32018", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32018" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "32179", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32179" }, { "name": "ADV-2008-2740", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2740" }, { "name": "31320", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31320" }, { "name": "SUSE-SA:2008:043", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html" }, { "name": "sun-javawebstart-unspecified-bo(43664)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43664" }, { "name": "ADV-2008-2056", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2056/references" }, { "name": "238905", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238905-1" }, { "name": "31055", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31055" }, { "name": "32180", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32180" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0016.html" }, { "name": "31736", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31736" }, { "name": "oval:org.mitre.oval:def:10541", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10541" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3178" }, { "name": "1020452", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020452" }, { "name": "30148", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30148" }, { "name": "31497", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31497" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-043/" }, { "name": "20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and patches for ESX and ESXi resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/497041/100/0/threaded" }, { "name": "20080717 ZDI-08-043: Sun Java Web Start vm args Stack Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/494505/100/0/threaded" }, { "name": "SUSE-SA:2008:045", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html" }, { "name": "RHSA-2008:0790", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0790.html" }, { "name": "TA08-193A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-193A.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37386" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3179" }, { "name": "RHSA-2008:0595", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0595.html" }, { "name": "31010", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31010" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-07-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "APPLE-SA-2008-09-24", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html" }, { "name": "20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=122331139823057\u0026w=2" }, { "name": "31600", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31600" }, { "name": "SUSE-SA:2008:042", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html" }, { "name": "32018", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32018" }, { "name": "GLSA-200911-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "32179", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32179" }, { "name": "ADV-2008-2740", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2740" }, { "name": "31320", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31320" }, { "name": "SUSE-SA:2008:043", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html" }, { "name": "sun-javawebstart-unspecified-bo(43664)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43664" }, { "name": "ADV-2008-2056", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2056/references" }, { "name": "238905", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238905-1" }, { "name": "31055", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31055" }, { "name": "32180", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32180" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0016.html" }, { "name": "31736", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31736" }, { "name": "oval:org.mitre.oval:def:10541", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10541" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3178" }, { "name": "1020452", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020452" }, { "name": "30148", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30148" }, { "name": "31497", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31497" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-043/" }, { "name": "20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and patches for ESX and ESXi resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/497041/100/0/threaded" }, { "name": "20080717 ZDI-08-043: Sun Java Web Start vm args Stack Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/494505/100/0/threaded" }, { "name": "SUSE-SA:2008:045", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html" }, { "name": "RHSA-2008:0790", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0790.html" }, { "name": "TA08-193A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-193A.html" }, { "name": "37386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37386" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3179" }, { "name": "RHSA-2008:0595", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0595.html" }, { "name": "31010", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31010" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3111", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2008-09-24", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html" }, { "name": "20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=122331139823057\u0026w=2" }, { "name": "31600", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31600" }, { "name": "SUSE-SA:2008:042", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html" }, { "name": "32018", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32018" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "32179", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32179" }, { "name": "ADV-2008-2740", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2740" }, { "name": "31320", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31320" }, { "name": "SUSE-SA:2008:043", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html" }, { "name": "sun-javawebstart-unspecified-bo(43664)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43664" }, { "name": "ADV-2008-2056", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2056/references" }, { "name": "238905", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238905-1" }, { "name": "31055", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31055" }, { "name": "32180", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32180" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0016.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0016.html" }, { "name": "31736", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31736" }, { "name": "oval:org.mitre.oval:def:10541", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10541" }, { "name": "http://support.apple.com/kb/HT3178", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3178" }, { "name": "1020452", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020452" }, { "name": "30148", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30148" }, { "name": "31497", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31497" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-08-043/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-043/" }, { "name": "20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and patches for ESX and ESXi resolve multiple security issues", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/497041/100/0/threaded" }, { "name": "20080717 ZDI-08-043: Sun Java Web Start vm args Stack Buffer Overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/494505/100/0/threaded" }, { "name": "SUSE-SA:2008:045", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html" }, { "name": "RHSA-2008:0790", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0790.html" }, { "name": "TA08-193A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-193A.html" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" }, { "name": "http://support.apple.com/kb/HT3179", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3179" }, { "name": "RHSA-2008:0595", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0595.html" }, { "name": "31010", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31010" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3111", "datePublished": "2008-07-09T23:00:00", "dateReserved": "2008-07-09T00:00:00", "dateUpdated": "2024-08-07T09:28:40.707Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2008-3111\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-07-09T23:41:00.000\",\"lastModified\":\"2024-11-21T00:48:27.347\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples desbordamientos de b\u00fafer en Sun Java Web Start en JDK y JRE versi\u00f3n 6 anterior a la Actualizaci\u00f3n 4, JDK y JRE versi\u00f3n 5.0 anterior a la Actualizaci\u00f3n 16, y SDK y JRE versi\u00f3n 1.4.x anterior a 1.4.2_18, permiten a los atacantes dependiendo del contexto obtener privilegios por medio de una aplicaci\u00f3n no confiable, como se ha demostrado por (a) una aplicaci\u00f3n que otorga privilegios para s\u00ed mismo (1) leer archivos locales, (2) escribir en archivos locales, o (3) ejecutar programas locales; y como lo demuestra por (b) un valor largo asociado con un atributo java-vm-args en una etiqueta j2se en un archivo JNLP, que activa un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria en la funci\u00f3n GetVMArgsOption; tambi\u00e9n se conoce como CR 6557220.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"},{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BB00A29-FEBB-4139-9E96-691EC1410EFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD8CC179-F76E-4CC2-9CBD-69CBBA5BD532\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2DC7389-9697-4EF0-9C4E-153731CDD75D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5F476C8-5466-4E6B-B73B-4ACFBB02AD5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8C7C8C1-AA0D-4BD9-A8EC-85BBE627DE13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAF0844B-ECB1-4AF0-AA32-1B8789AC5042\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EFEB813-B20D-4C8B-922D-0603CB93F72A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"25322D24-C5D9-43A6-87CC-1BF7FA6A3E76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"400FDCDE-16DE-4BD6-81E2-4A5DA12E99CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"82C49C78-ACE3-407D-AE21-EA180633C437\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F91F8A2-D473-48DC-81DA-21291DE7B6E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E46B3B4-9E1C-4C87-A4CD-C4CE7FBCA7F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F69C703-8541-4AA8-A66A-0292E0FCB749\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*\",\"matchCriteriaId\":\"99E08AB2-49AD-42C6-967F-773F2C6E188A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*\",\"matchCriteriaId\":\"9459F130-A3DD-4A4E-9582-4FB82619EB5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C9F6EA8-6A88-4485-89A3-0FDF84AB51DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"67E0818A-3675-4293-89FE-5001E36C0F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"95112B98-B6B2-43FA-BF76-F518649CF3BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D73559DD-54B4-4DF2-81BC-9109DB29DCCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27A472AF-049D-4D63-841C-1EF737E8D64D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB48B161-C239-4BB5-8667-7ACA5A5437F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83629616-1814-4858-B09F-79BEA82D6F55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03E8F351-F900-436E-A726-55AE31FBF832\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F76B79C6-ADD0-4992-A4BD-423A0AD38714\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBFD41B5-6E33-4B00-81E8-9D91B0A03BD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"685D3F7F-30B9-4EB8-90FC-66A2A067A510\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D102063B-2434-4141-98E7-2DE501AE1728\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03B8CD03-CD31-4F4D-BA90-59435578A4F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41A994BF-1F64-480A-8AA5-748DDD0AB68C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88519F2D-AD06-4F05-BEDA-A09216F1B481\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC728978-368D-4B36-B149-70473E92BD1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD5187B1-CB86-48E8-A595-9FCFD9822C0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C660DE4-543A-4E9B-825D-CD099D08CBD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"318719C9-7B01-4021-B2EF-8341254DFE6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB8FA9BA-51CA-4473-9FE1-9A32FB8C8041\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A2379FC-BC33-4C90-97DD-ED3723172008\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"86A1256D-7A34-4FDD-9536-82FD6497A712\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BB5E47A-8C17-4995-9EF8-01BFA0B702B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"9300FA38-C234-4BD8-ADB6-D2A29EBA81DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*\",\"matchCriteriaId\":\"C87F6EE3-F66B-4F15-89BA-26A4D3AD2556\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*\",\"matchCriteriaId\":\"56F0F497-6586-408B-80AF-6BC2B9909397\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_15:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E022C6E-20DE-4124-9CA3-11400E13A05A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D594E269-D722-45FC-B390-B0D38ADEC923\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CAA89D6-651A-4B8C-A134-C3A2CB84002A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B930EAFB-F2E6-4FCA-A21B-022656396A2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B20EB5F-D12A-4267-9887-C39A188EB9AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"52347FDC-9983-4A64-8031-B4A50DDC9BBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"C95654B3-ACA0-4B0D-9F31-B9C5FB7B9C96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*\",\"matchCriteriaId\":\"8387A041-582A-4010-9C44-672090F41A72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1F2D335-CDDF-4D2E-80CA-F1A0AF92501A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F98D2BD-2AC1-4C4C-8A10-71093DCBC4E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDC09958-5286-4C16-AB6F-63B4BDD902B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE1E9E9-85EF-4ACA-902B-00225EB4324F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB5DB61B-ED8B-46E6-AF81-8251682D22A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"002CA86D-3090-4C7A-947A-21CB5D1ADD98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6C4CA79-9D0A-4E47-A1A4-9CBEDDCFE05E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF4E34FD-D927-42BB-8A16-031D77CB4B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37A3D49A-BE20-47BF-A85F-122357BAB098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F45DB5D3-7F35-4531-9A82-24EB50034787\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4695F707-12E8-4BA4-BBE1-C21CB7213A2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C918FB49-DA13-4326-BE86-6F6BEA4CE4E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5573CAD1-39D1-4ADB-BB95-EBB554B43B4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD02EBDF-6E51-4538-9EDD-B1DE914D09C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53C3C0E3-5F40-412B-A4AD-A7A291DE2A08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36888382-79C8-4C97-A654-C668CD68556F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F34C99E6-F9F0-4EF3-8601-B47EAE3D7273\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A74DD08D-CEDB-460E-BED5-78F6CAF18BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4F64FBC-DC97-4FE3-A235-18B87945AF7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85048406-9051-4E69-94A8-5C449F3B89E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1C88DD7-0B46-4405-BD35-60D27E2DBA14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08D23B7C-7B8C-41B8-8D94-BB0F27C7F0A8\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=122331139823057\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/31010\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31055\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31320\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31497\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31600\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31736\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/32018\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32179\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32180\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37386\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200911-02.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-238905-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://support.apple.com/kb/HT3178\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.apple.com/kb/HT3179\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0595.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0790.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/494505/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/497041/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/30148\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1020452\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-193A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2008-0016.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2056/references\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2740\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.zerodayinitiative.com/advisories/ZDI-08-043/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/43664\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10541\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=122331139823057\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31010\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31055\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31320\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31497\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31600\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31736\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32018\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32179\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32180\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37386\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200911-02.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-238905-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://support.apple.com/kb/HT3178\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT3179\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0595.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0790.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/494505/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/497041/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/30148\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1020452\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-193A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2008-0016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2056/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2740\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.zerodayinitiative.com/advisories/ZDI-08-043/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/43664\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10541\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2008_0790
Vulnerability from csaf_redhat
Published
2008-07-31 15:23
Modified
2024-11-14 10:06
Summary
Red Hat Security Advisory: java-1.5.0-ibm security update
Notes
Topic
Updated java-1.5.0-ibm packages that fix several security issues are now
available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Details
The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and
the IBM Java 2 Software Development Kit.
Multiple vulnerabilities with unsigned applets were reported. A remote
attacker could misuse an unsigned applet to connect to localhost services
running on the host running the applet. (CVE-2008-3104)
A vulnerability in the XML processing API was found. A remote attacker who
caused malicious XML to be processed by an untrusted applet or application
was able to elevate permissions to access URLs on a remote host.
(CVE-2008-3106)
A buffer overflow vulnerability was found in the font processing code. This
allowed remote attackers to extend the permissions of an untrusted applet
or application, allowing it to read and/or write local files, as well as to
execute local applications accessible to the user running the untrusted
application. (CVE-2008-3108)
Several buffer overflow vulnerabilities in Java Web Start were reported.
These vulnerabilities allowed an untrusted Java Web Start application to
elevate its privileges, allowing it to read and/or write local files, as
well as to execute local applications accessible to the user running the
untrusted application. (CVE-2008-3111)
Two file processing vulnerabilities in Java Web Start were found. A remote
attacker, by means of an untrusted Java Web Start application, was able to
create or delete arbitrary files with the permissions of the user running
the untrusted application. (CVE-2008-3112, CVE-2008-3113)
A vulnerability in Java Web Start when processing untrusted applications
was reported. An attacker was able to acquire sensitive information, such
as the cache location. (CVE-2008-3114)
All users of java-1.5.0-ibm are advised to upgrade to these updated
packages, that contain the IBM 1.5.0 SR8 Java release, which resolves
these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.5.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nMultiple vulnerabilities with unsigned applets were reported. A remote\nattacker could misuse an unsigned applet to connect to localhost services\nrunning on the host running the applet. (CVE-2008-3104) \n\nA vulnerability in the XML processing API was found. A remote attacker who\ncaused malicious XML to be processed by an untrusted applet or application\nwas able to elevate permissions to access URLs on a remote host.\n(CVE-2008-3106)\n\nA buffer overflow vulnerability was found in the font processing code. This\nallowed remote attackers to extend the permissions of an untrusted applet\nor application, allowing it to read and/or write local files, as well as to\nexecute local applications accessible to the user running the untrusted\napplication. (CVE-2008-3108)\n\nSeveral buffer overflow vulnerabilities in Java Web Start were reported.\nThese vulnerabilities allowed an untrusted Java Web Start application to\nelevate its privileges, allowing it to read and/or write local files, as\nwell as to execute local applications accessible to the user running the\nuntrusted application. (CVE-2008-3111)\n\nTwo file processing vulnerabilities in Java Web Start were found. A remote\nattacker, by means of an untrusted Java Web Start application, was able to\ncreate or delete arbitrary files with the permissions of the user running\nthe untrusted application. (CVE-2008-3112, CVE-2008-3113)\n\nA vulnerability in Java Web Start when processing untrusted applications\nwas reported. An attacker was able to acquire sensitive information, such\nas the cache location. (CVE-2008-3114)\n\nAll users of java-1.5.0-ibm are advised to upgrade to these updated\npackages, that contain the IBM 1.5.0 SR8 Java release, which resolves\nthese issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0790", "url": "https://access.redhat.com/errata/RHSA-2008:0790" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "452649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452649" }, { "category": "external", "summary": "454601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454601" }, { "category": "external", "summary": "454604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454604" }, { "category": "external", "summary": "454605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454605" }, { "category": "external", "summary": "454606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454606" }, { "category": "external", "summary": "454607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454607" }, { "category": "external", "summary": "454608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454608" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0790.json" } ], "title": "Red Hat Security Advisory: java-1.5.0-ibm security update", "tracking": { "current_release_date": "2024-11-14T10:06:30+00:00", "generator": { "date": "2024-11-14T10:06:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2008:0790", "initial_release_date": "2008-07-31T15:23:00+00:00", "revision_history": [ { "date": "2008-07-31T15:23:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-07-31T11:23:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:06:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.8-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.8-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.8-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.8-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.8-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.8-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.8-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.8-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.8-1jpp.1.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "product": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "product_id": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.8-1jpp.1.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.8-1jpp.1.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.8-1jpp.1.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.8-1jpp.1.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "product_id": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.8-1jpp.1.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.8-1jpp.1.el4?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.8-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.8-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.8-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.8-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.8-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.8-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.8-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "product_id": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.8-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.8-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.8-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.8-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.8-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.8-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.8-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.8-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.8-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.8-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.8-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.8-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.8-1jpp.1.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "product": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "product_id": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.8-1jpp.1.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.8-1jpp.1.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.8-1jpp.1.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.8-1jpp.1.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "product_id": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.8-1jpp.1.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.8-1jpp.1.el4?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.8-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "product_id": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.8-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.8-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.8-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.8-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.8-1jpp.1.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "product_id": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.8-1jpp.1.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.8-1jpp.1.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.8-1jpp.1.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.8-1jpp.1.el4?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.8-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "product": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "product_id": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.8-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.8-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.8-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "product_id": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.8-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "product": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "product_id": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.8-1jpp.1.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.8-1jpp.1.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.8-1jpp.1.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "product_id": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.8-1jpp.1.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.8-1jpp.1.el4?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.8-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "product": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "product_id": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.8-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.8-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.8-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "product_id": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.8-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "product": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "product_id": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.8-1jpp.1.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.8-1jpp.1.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.8-1jpp.1.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "product_id": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.8-1jpp.1.el4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-3104", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454601" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allow remote attackers to violate the security model for an applet\u0027s outbound connections by connecting to localhost services running on the machine that loaded the applet.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java RE allows Same Origin Policy to be Bypassed (6687932)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3104" }, { "category": "external", "summary": "RHBZ#454601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3104", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3104" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-07-31T15:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0790" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java RE allows Same Origin Policy to be Bypassed (6687932)" }, { "cve": "CVE-2008-3106", "discovery_date": "2008-06-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618330" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier and JDK and JRE 5.0 Update 15 and earlier allows remote attackers to access URLs via unknown vectors involving processing of XML data by an untrusted (1) application or (2) applet, a different vulnerability than CVE-2008-3105.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3106" }, { "category": "external", "summary": "RHBZ#1618330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3106", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3106" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3106", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3106" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-07-31T15:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0790" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2008-3108", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454604" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Sun Java Runtime Environment (JRE) in JDK and JRE 5.0 before Update 10, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allows context-dependent attackers to gain privileges via unspecified vectors related to font processing.", "title": "Vulnerability description" }, { "category": "summary", "text": "Security Vulnerability with JRE fonts processing may allow Elevation of Privileges (6450319)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3108" }, { "category": "external", "summary": "RHBZ#454604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454604" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3108", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3108" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-07-31T15:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0790" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Security Vulnerability with JRE fonts processing may allow Elevation of Privileges (6450319)" }, { "cve": "CVE-2008-3111", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454605" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start Buffer overflow vulnerabilities (6557220)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3111" }, { "category": "external", "summary": "RHBZ#454605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454605" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3111", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3111" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-07-31T15:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0790" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start Buffer overflow vulnerabilities (6557220)" }, { "cve": "CVE-2008-3112", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454606" } ], "notes": [ { "category": "description", "text": "Directory traversal vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create arbitrary files via the writeManifest method in the CacheEntry class, aka CR 6703909.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start, arbitrary file creation (6703909)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3112" }, { "category": "external", "summary": "RHBZ#454606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454606" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3112", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3112" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-07-31T15:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0790" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start, arbitrary file creation (6703909)" }, { "cve": "CVE-2008-3113", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454607" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java Web Start in JDK and JRE 5.0 before Update 16 and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create or delete arbitrary files via an untrusted application, aka CR 6704077.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start arbitrary file creation/deletion file with user permissions (6704077)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3113" }, { "category": "external", "summary": "RHBZ#454607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454607" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3113" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-07-31T15:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0790" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start arbitrary file creation/deletion file with user permissions (6704077)" }, { "cve": "CVE-2008-3114", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454608" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows context-dependent attackers to obtain sensitive information (the cache location) via an untrusted application, aka CR 6704074.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start, untrusted application may determine Cache Location (6704074)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3114" }, { "category": "external", "summary": "RHBZ#454608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454608" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3114", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3114" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-07-31T15:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.8-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.8-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0790" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Java Web Start, untrusted application may determine Cache Location (6704074)" } ] }
rhsa-2008_0595
Vulnerability from csaf_redhat
Published
2008-07-14 15:37
Modified
2024-11-14 10:06
Summary
Red Hat Security Advisory: java-1.5.0-sun security update
Notes
Topic
Updated java-1.5.0-sun packages that correct several security issues are
now available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Details
The Java Runtime Environment (JRE) contains the software and tools that
users need to run applets and applications written using the Java
programming language.
A vulnerability was found in the Java Management Extensions (JMX)
management agent, when local monitoring is enabled. This allowed remote
attackers to perform illegal operations. (CVE-2008-3103)
Multiple vulnerabilities with unsigned applets were reported. A remote
attacker could misuse an unsigned applet to connect to localhost services
running on the host running the applet. (CVE-2008-3104)
A Java Runtime Environment (JRE) vulnerability could be triggered by an
untrusted application or applet. A remote attacker could grant an untrusted
applet extended privileges such as reading and writing local files, or
executing local programs. (CVE-2008-3107)
Several buffer overflow vulnerabilities in Java Web Start were reported.
These vulnerabilities may allow an untrusted Java Web Start application to
elevate its privileges and thereby grant itself permission to read and/or
write local files, as well as to execute local applications accessible to
the user running the untrusted application. (CVE-2008-3111)
Two file processing vulnerabilities in Java Web Start were found. A remote
attacker, by means of an untrusted Java Web Start application, was able to
create or delete arbitrary files with the permissions of the user running
the untrusted application. (CVE-2008-3112, CVE-2008-3113)
A vulnerability in Java Web Start when processing untrusted applications
was reported. An attacker was able to acquire sensitive information, such
as the cache location. (CVE-2008-3114)
Users of java-1.5.0-sun should upgrade to these updated packages, which
correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.5.0-sun packages that correct several security issues are\nnow available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Java Runtime Environment (JRE) contains the software and tools that\nusers need to run applets and applications written using the Java\nprogramming language. \n\nA vulnerability was found in the Java Management Extensions (JMX)\nmanagement agent, when local monitoring is enabled. This allowed remote\nattackers to perform illegal operations. (CVE-2008-3103)\n\nMultiple vulnerabilities with unsigned applets were reported. A remote\nattacker could misuse an unsigned applet to connect to localhost services\nrunning on the host running the applet. (CVE-2008-3104)\n\nA Java Runtime Environment (JRE) vulnerability could be triggered by an\nuntrusted application or applet. A remote attacker could grant an untrusted\napplet extended privileges such as reading and writing local files, or\nexecuting local programs. (CVE-2008-3107)\n\nSeveral buffer overflow vulnerabilities in Java Web Start were reported.\nThese vulnerabilities may allow an untrusted Java Web Start application to\nelevate its privileges and thereby grant itself permission to read and/or\nwrite local files, as well as to execute local applications accessible to\nthe user running the untrusted application. (CVE-2008-3111)\n\nTwo file processing vulnerabilities in Java Web Start were found. A remote\nattacker, by means of an untrusted Java Web Start application, was able to\ncreate or delete arbitrary files with the permissions of the user running\nthe untrusted application. (CVE-2008-3112, CVE-2008-3113)\n\nA vulnerability in Java Web Start when processing untrusted applications\nwas reported. An attacker was able to acquire sensitive information, such\nas the cache location. (CVE-2008-3114) \n\nUsers of java-1.5.0-sun should upgrade to these updated packages, which\ncorrect these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0595", "url": "https://access.redhat.com/errata/RHSA-2008:0595" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "452658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452658" }, { "category": "external", "summary": "452659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452659" }, { "category": "external", "summary": "454601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454601" }, { "category": "external", "summary": "454605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454605" }, { "category": "external", "summary": "454606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454606" }, { "category": "external", "summary": "454607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454607" }, { "category": "external", "summary": "454608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454608" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0595.json" } ], "title": "Red Hat Security Advisory: java-1.5.0-sun security update", "tracking": { "current_release_date": "2024-11-14T10:06:39+00:00", "generator": { "date": "2024-11-14T10:06:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2008:0595", "initial_release_date": "2008-07-14T15:37:00+00:00", "revision_history": [ { "date": "2008-07-14T15:37:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-07-14T11:37:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:06:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "product": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "product_id": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.16-1jpp.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "product": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "product_id": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.16-1jpp.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "product": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "product_id": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.16-1jpp.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64", "product": { "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64", "product_id": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.16-1jpp.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "product": { "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "product_id": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.16-1jpp.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "product": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "product_id": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.16-1jpp.2.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "product": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "product_id": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.16-1jpp.2.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "product": { "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "product_id": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.16-1jpp.2.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "product": { "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "product_id": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.16-1jpp.2.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "product": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "product_id": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.16-1jpp.2.el4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "product": { "name": "java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "product_id": "java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-plugin@1.5.0.16-1jpp.2.el5?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "product": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "product_id": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.16-1jpp.2.el5?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "product": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "product_id": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.16-1jpp.2.el5?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "product": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "product_id": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.16-1jpp.2.el5?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "product": { "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "product_id": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.16-1jpp.2.el5?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "product": { "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "product_id": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.16-1jpp.2.el5?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "product": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "product_id": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.16-1jpp.2.el4?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "product": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "product_id": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.16-1jpp.2.el4?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "product": { "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "product_id": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.16-1jpp.2.el4?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "product": { "name": "java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "product_id": "java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-plugin@1.5.0.16-1jpp.2.el4?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "product": { "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "product_id": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.16-1jpp.2.el4?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "product": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "product_id": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.16-1jpp.2.el4?arch=i586" } } } ], "category": "architecture", "name": "i586" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586" }, "product_reference": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586" }, "product_reference": "java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586" }, "product_reference": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586" }, "product_reference": "java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-3103", "discovery_date": "2008-06-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "452659" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Management Extensions (JMX) management agent in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier and JDK and JRE 5.0 Update 15 and earlier, when local monitoring is enabled, allows remote attackers to \"perform unauthorized operations\" via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK JMX allows illegal operations with local monitoring (6332953)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3103" }, { "category": "external", "summary": "RHBZ#452659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3103", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3103" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3103", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3103" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-07-14T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0595" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK JMX allows illegal operations with local monitoring (6332953)" }, { "cve": "CVE-2008-3104", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454601" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allow remote attackers to violate the security model for an applet\u0027s outbound connections by connecting to localhost services running on the machine that loaded the applet.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java RE allows Same Origin Policy to be Bypassed (6687932)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3104" }, { "category": "external", "summary": "RHBZ#454601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3104", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3104" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-07-14T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0595" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java RE allows Same Origin Policy to be Bypassed (6687932)" }, { "cve": "CVE-2008-3107", "discovery_date": "2008-06-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "452658" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Virtual Machine in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows context-dependent attackers to gain privileges via an untrusted (1) application or (2) applet, as demonstrated by an application or applet that grants itself privileges to (a) read local files, (b) write to local files, or (c) execute local programs.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK untrusted applet/application privilege escalation (6661918)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3107" }, { "category": "external", "summary": "RHBZ#452658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452658" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3107", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3107" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3107", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3107" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-07-14T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0595" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK untrusted applet/application privilege escalation (6661918)" }, { "cve": "CVE-2008-3111", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454605" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start Buffer overflow vulnerabilities (6557220)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3111" }, { "category": "external", "summary": "RHBZ#454605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454605" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3111", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3111" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-07-14T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0595" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start Buffer overflow vulnerabilities (6557220)" }, { "cve": "CVE-2008-3112", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454606" } ], "notes": [ { "category": "description", "text": "Directory traversal vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create arbitrary files via the writeManifest method in the CacheEntry class, aka CR 6703909.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start, arbitrary file creation (6703909)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3112" }, { "category": "external", "summary": "RHBZ#454606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454606" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3112", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3112" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-07-14T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0595" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start, arbitrary file creation (6703909)" }, { "cve": "CVE-2008-3113", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454607" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java Web Start in JDK and JRE 5.0 before Update 16 and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create or delete arbitrary files via an untrusted application, aka CR 6704077.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start arbitrary file creation/deletion file with user permissions (6704077)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3113" }, { "category": "external", "summary": "RHBZ#454607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454607" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3113" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-07-14T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0595" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start arbitrary file creation/deletion file with user permissions (6704077)" }, { "cve": "CVE-2008-3114", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454608" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows context-dependent attackers to obtain sensitive information (the cache location) via an untrusted application, aka CR 6704074.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start, untrusted application may determine Cache Location (6704074)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3114" }, { "category": "external", "summary": "RHBZ#454608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454608" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3114", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3114" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-07-14T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.16-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.16-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0595" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Java Web Start, untrusted application may determine Cache Location (6704074)" } ] }
rhsa-2008_0638
Vulnerability from csaf_redhat
Published
2008-08-13 14:19
Modified
2024-11-14 10:06
Summary
Red Hat Security Advisory: Red Hat Network Satellite Server IBM Java Runtime security update
Notes
Topic
Red Hat Network Satellite Server version 5.1.1 is now available. This
update includes fixes for a number of security issues in the Red Hat
Network Satellite Server IBM Java Runtime Environment for IBM S/390 and IBM
System z architectures.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
This release corrects several security vulnerabilities in the IBM Java
Runtime Environment shipped as part of Red Hat Network Satellite Server 5.1
for IBM S/390 and IBM System z architectures. In a typical operating
environment, these are of low security risk as the runtime is not used on
untrusted applets.
Multiple flaws were fixed in the IBM Java 1.5.0 Runtime Environment.
(CVE-2008-0657, CVE-2008-1187, CVE-2008-1188, CVE-2008-1189, CVE-2008-1190,
CVE-2008-1192, CVE-2008-1193, CVE-2008-1194, CVE-2008-1195, CVE-2008-1196,
CVE-2008-3104, CVE-2008-3106, CVE-2008-3108, CVE-2008-3111, CVE-2008-3112,
CVE-2008-3113, CVE-2008-3114)
Users of Red Hat Network Satellite Server 5.1 are advised to upgrade to
5.1.1, which resolves these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Network Satellite Server version 5.1.1 is now available. This\nupdate includes fixes for a number of security issues in the Red Hat\nNetwork Satellite Server IBM Java Runtime Environment for IBM S/390 and IBM\nSystem z architectures.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "This release corrects several security vulnerabilities in the IBM Java\nRuntime Environment shipped as part of Red Hat Network Satellite Server 5.1\nfor IBM S/390 and IBM System z architectures. In a typical operating\nenvironment, these are of low security risk as the runtime is not used on\nuntrusted applets.\n\nMultiple flaws were fixed in the IBM Java 1.5.0 Runtime Environment.\n(CVE-2008-0657, CVE-2008-1187, CVE-2008-1188, CVE-2008-1189, CVE-2008-1190,\nCVE-2008-1192, CVE-2008-1193, CVE-2008-1194, CVE-2008-1195, CVE-2008-1196,\nCVE-2008-3104, CVE-2008-3106, CVE-2008-3108, CVE-2008-3111, CVE-2008-3112,\nCVE-2008-3113, CVE-2008-3114)\n\nUsers of Red Hat Network Satellite Server 5.1 are advised to upgrade to\n5.1.1, which resolves these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0638", "url": "https://access.redhat.com/errata/RHSA-2008:0638" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "431861", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431861" }, { "category": "external", "summary": "436030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436030" }, { "category": "external", "summary": "436293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436293" }, { "category": "external", "summary": "436295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436295" }, { "category": "external", "summary": "436296", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436296" }, { "category": "external", "summary": "436299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436299" }, { "category": "external", "summary": "436302", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436302" }, { "category": "external", "summary": "452649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452649" }, { "category": "external", "summary": "454601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454601" }, { "category": "external", "summary": "454604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454604" }, { "category": "external", "summary": "454605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454605" }, { "category": "external", "summary": "454606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454606" }, { "category": "external", "summary": "454607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454607" }, { "category": "external", "summary": "454608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454608" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0638.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite Server IBM Java Runtime security update", "tracking": { "current_release_date": "2024-11-14T10:06:23+00:00", "generator": { "date": "2024-11-14T10:06:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2008:0638", "initial_release_date": "2008-08-13T14:19:00+00:00", "revision_history": [ { "date": "2008-08-13T14:19:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-08-13T10:19:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:06:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.1 (RHEL v.4 AS)", "product": { "name": "Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.1::el4" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.8-1jpp.1.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "product": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "product_id": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.8-1jpp.1.el4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.8-1jpp.1.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "product": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "product_id": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.8-1jpp.1.el4?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4AS-RHNSAT5.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "relates_to_product_reference": "4AS-RHNSAT5.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "relates_to_product_reference": "4AS-RHNSAT5.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x", "relates_to_product_reference": "4AS-RHNSAT5.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-0657", "discovery_date": "2008-02-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "431861" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the Java Runtime Environment in Sun JDK and JRE 6 Update 1 and earlier, and 5.0 Update 13 and earlier, allow context-dependent attackers to gain privileges via an untrusted (1) application or (2) applet, as demonstrated by an application or applet that grants itself privileges to (a) read local files, (b) write to local files, or (c) execute local programs.", "title": "Vulnerability description" }, { "category": "summary", "text": "java-1.5.0 Privilege escalation via unstrusted applet and application", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0657" }, { "category": "external", "summary": "RHBZ#431861", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431861" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0657", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0657" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0657", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0657" } ], "release_date": "2008-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0638" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "java-1.5.0 Privilege escalation via unstrusted applet and application" }, { "cve": "CVE-2008-1187", "discovery_date": "2008-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "436030" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java Runtime Environment (JRE) and JDK 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to cause a denial of service (JRE crash) and possibly execute arbitrary code via unknown vectors related to XSLT transforms.", "title": "Vulnerability description" }, { "category": "summary", "text": "Untrusted applet and application XSLT processing privilege escalation", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1187" }, { "category": "external", "summary": "RHBZ#436030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436030" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1187", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1187" } ], "release_date": "2008-03-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0638" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Untrusted applet and application XSLT processing privilege escalation" }, { "cve": "CVE-2008-1188", "discovery_date": "2008-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "436293" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in the useEncodingDecl function in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allow remote attackers to execute arbitrary code via a JNLP file with (1) a long key name in the xml header or (2) a long charset value, different issues than CVE-2008-1189, aka \"The first two issues.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1188" }, { "category": "external", "summary": "RHBZ#436293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436293" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1188", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1188" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1188", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1188" } ], "release_date": "2008-03-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0638" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190)" }, { "cve": "CVE-2008-1189", "discovery_date": "2008-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "436293" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different issue than CVE-2008-1188, aka the \"third\" issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1189" }, { "category": "external", "summary": "RHBZ#436293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436293" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1189", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1189" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1189", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1189" } ], "release_date": "2008-03-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0638" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190)" }, { "cve": "CVE-2008-1190", "discovery_date": "2008-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "436293" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to gain privileges via an untrusted application, a different issue than CVE-2008-1191, aka the \"fourth\" issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1190" }, { "category": "external", "summary": "RHBZ#436293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436293" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1190", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1190" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1190", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1190" } ], "release_date": "2008-03-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0638" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190)" }, { "cve": "CVE-2008-1192", "discovery_date": "2008-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "436295" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Plug-in for Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier, and 1.3.1_21 and earlier; allows remote attackers to bypass the same origin policy and \"execute local applications\" via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Plugin same-origin-policy bypass", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1192" }, { "category": "external", "summary": "RHBZ#436295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436295" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1192", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1192" } ], "release_date": "2008-03-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0638" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Plugin same-origin-policy bypass" }, { "cve": "CVE-2008-1193", "discovery_date": "2008-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "436296" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Java Runtime Environment Image Parsing Library in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allows remote attackers to gain privileges via an untrusted application.", "title": "Vulnerability description" }, { "category": "summary", "text": "JRE image parsing library allows privilege escalation (CVE-2008-1194)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1193" }, { "category": "external", "summary": "RHBZ#436296", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436296" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1193", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1193" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1193", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1193" } ], "release_date": "2008-03-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0638" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JRE image parsing library allows privilege escalation (CVE-2008-1194)" }, { "cve": "CVE-2008-1194", "discovery_date": "2008-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "436296" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the color management library in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allows remote attackers to cause a denial of service (crash) via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JRE image parsing library allows privilege escalation (CVE-2008-1194)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1194" }, { "category": "external", "summary": "RHBZ#436296", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436296" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1194", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1194" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1194", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1194" } ], "release_date": "2008-03-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0638" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JRE image parsing library allows privilege escalation (CVE-2008-1194)" }, { "cve": "CVE-2008-1195", "discovery_date": "2008-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "436299" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun JDK and Java Runtime Environment (JRE) 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to access arbitrary network services on the local host via unspecified vectors related to JavaScript and Java APIs.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java-API calls in untrusted Javascript allow network privilege escalation", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1195" }, { "category": "external", "summary": "RHBZ#436299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436299" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1195", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1195" } ], "release_date": "2008-03-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0638" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java-API calls in untrusted Javascript allow network privilege escalation" }, { "cve": "CVE-2008-1196", "discovery_date": "2008-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "436302" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in Java Web Start (javaws.exe) in Sun JDK and JRE 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to execute arbitrary code via a crafted JNLP file.", "title": "Vulnerability description" }, { "category": "summary", "text": "Buffer overflow security vulnerabilities in Java Web Start", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1196" }, { "category": "external", "summary": "RHBZ#436302", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436302" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1196", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1196" } ], "release_date": "2008-03-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0638" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Buffer overflow security vulnerabilities in Java Web Start" }, { "cve": "CVE-2008-3104", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454601" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allow remote attackers to violate the security model for an applet\u0027s outbound connections by connecting to localhost services running on the machine that loaded the applet.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java RE allows Same Origin Policy to be Bypassed (6687932)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3104" }, { "category": "external", "summary": "RHBZ#454601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3104", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3104" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0638" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java RE allows Same Origin Policy to be Bypassed (6687932)" }, { "cve": "CVE-2008-3106", "discovery_date": "2008-06-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618330" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier and JDK and JRE 5.0 Update 15 and earlier allows remote attackers to access URLs via unknown vectors involving processing of XML data by an untrusted (1) application or (2) applet, a different vulnerability than CVE-2008-3105.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3106" }, { "category": "external", "summary": "RHBZ#1618330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3106", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3106" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3106", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3106" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0638" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2008-3108", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454604" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Sun Java Runtime Environment (JRE) in JDK and JRE 5.0 before Update 10, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allows context-dependent attackers to gain privileges via unspecified vectors related to font processing.", "title": "Vulnerability description" }, { "category": "summary", "text": "Security Vulnerability with JRE fonts processing may allow Elevation of Privileges (6450319)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3108" }, { "category": "external", "summary": "RHBZ#454604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454604" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3108", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3108" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0638" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Security Vulnerability with JRE fonts processing may allow Elevation of Privileges (6450319)" }, { "cve": "CVE-2008-3111", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454605" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start Buffer overflow vulnerabilities (6557220)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3111" }, { "category": "external", "summary": "RHBZ#454605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454605" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3111", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3111" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0638" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start Buffer overflow vulnerabilities (6557220)" }, { "cve": "CVE-2008-3112", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454606" } ], "notes": [ { "category": "description", "text": "Directory traversal vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create arbitrary files via the writeManifest method in the CacheEntry class, aka CR 6703909.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start, arbitrary file creation (6703909)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3112" }, { "category": "external", "summary": "RHBZ#454606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454606" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3112", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3112" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0638" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start, arbitrary file creation (6703909)" }, { "cve": "CVE-2008-3113", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454607" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java Web Start in JDK and JRE 5.0 before Update 16 and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create or delete arbitrary files via an untrusted application, aka CR 6704077.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start arbitrary file creation/deletion file with user permissions (6704077)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3113" }, { "category": "external", "summary": "RHBZ#454607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454607" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3113" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0638" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start arbitrary file creation/deletion file with user permissions (6704077)" }, { "cve": "CVE-2008-3114", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454608" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows context-dependent attackers to obtain sensitive information (the cache location) via an untrusted application, aka CR 6704074.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start, untrusted application may determine Cache Location (6704074)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3114" }, { "category": "external", "summary": "RHBZ#454608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454608" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3114", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3114" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:19:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-1:1.5.0.8-1jpp.1.el4.s390x", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390", "4AS-RHNSAT5.1:java-1.5.0-ibm-devel-1:1.5.0.8-1jpp.1.el4.s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0638" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Java Web Start, untrusted application may determine Cache Location (6704074)" } ] }
rhsa-2008_0636
Vulnerability from csaf_redhat
Published
2008-08-13 14:18
Modified
2024-11-14 10:06
Summary
Red Hat Security Advisory: Red Hat Network Satellite Server Sun Java Runtime security update
Notes
Topic
Red Hat Network Satellite Server version 5.1.1 is now available. This
update includes fixes for a number of security issues in the Red Hat
Network Satellite Server Sun Java Runtime Environment.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
This release corrects several security vulnerabilities in the Sun Java
Runtime Environment shipped as part of Red Hat Network Satellite Server
5.1. In a typical operating environment, these are of low security risk as
the runtime is not used on untrusted applets.
Multiple flaws were fixed in the Sun Java 1.5.0 Runtime Environment.
(CVE-2008-3103, CVE-2008-3104, CVE-2008-3107, CVE-2008-3111, CVE-2008-3112,
CVE-2008-3113, CVE-2008-3114)
Users of Red Hat Network Satellite Server 5.1 are advised to upgrade to
5.1.1, which resolves these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Network Satellite Server version 5.1.1 is now available. This\nupdate includes fixes for a number of security issues in the Red Hat\nNetwork Satellite Server Sun Java Runtime Environment.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "This release corrects several security vulnerabilities in the Sun Java\nRuntime Environment shipped as part of Red Hat Network Satellite Server\n5.1. In a typical operating environment, these are of low security risk as\nthe runtime is not used on untrusted applets.\n\nMultiple flaws were fixed in the Sun Java 1.5.0 Runtime Environment.\n(CVE-2008-3103, CVE-2008-3104, CVE-2008-3107, CVE-2008-3111, CVE-2008-3112,\nCVE-2008-3113, CVE-2008-3114)\n\nUsers of Red Hat Network Satellite Server 5.1 are advised to upgrade to\n5.1.1, which resolves these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0636", "url": "https://access.redhat.com/errata/RHSA-2008:0636" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "452658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452658" }, { "category": "external", "summary": "452659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452659" }, { "category": "external", "summary": "454601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454601" }, { "category": "external", "summary": "454605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454605" }, { "category": "external", "summary": "454606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454606" }, { "category": "external", "summary": "454607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454607" }, { "category": "external", "summary": "454608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454608" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0636.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite Server Sun Java Runtime security update", "tracking": { "current_release_date": "2024-11-14T10:06:19+00:00", "generator": { "date": "2024-11-14T10:06:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2008:0636", "initial_release_date": "2008-08-13T14:18:00+00:00", "revision_history": [ { "date": "2008-08-13T14:18:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-08-13T10:18:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:06:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.1 (RHEL v.4 AS)", "product": { "name": "Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.1::el4" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "product": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "product_id": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.16-1jpp.2.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "product": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "product_id": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.16-1jpp.2.el4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "product": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "product_id": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.16-1jpp.2.el4?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "product": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "product_id": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.16-1jpp.2.el4?arch=i586" } } } ], "category": "architecture", "name": "i586" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4AS-RHNSAT5.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-RHNSAT5.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "relates_to_product_reference": "4AS-RHNSAT5.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-RHNSAT5.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-3103", "discovery_date": "2008-06-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "452659" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Management Extensions (JMX) management agent in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier and JDK and JRE 5.0 Update 15 and earlier, when local monitoring is enabled, allows remote attackers to \"perform unauthorized operations\" via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK JMX allows illegal operations with local monitoring (6332953)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3103" }, { "category": "external", "summary": "RHBZ#452659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3103", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3103" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3103", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3103" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:18:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.1.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0636" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK JMX allows illegal operations with local monitoring (6332953)" }, { "cve": "CVE-2008-3104", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454601" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allow remote attackers to violate the security model for an applet\u0027s outbound connections by connecting to localhost services running on the machine that loaded the applet.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java RE allows Same Origin Policy to be Bypassed (6687932)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3104" }, { "category": "external", "summary": "RHBZ#454601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3104", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3104" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:18:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.1.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0636" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java RE allows Same Origin Policy to be Bypassed (6687932)" }, { "cve": "CVE-2008-3107", "discovery_date": "2008-06-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "452658" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Virtual Machine in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows context-dependent attackers to gain privileges via an untrusted (1) application or (2) applet, as demonstrated by an application or applet that grants itself privileges to (a) read local files, (b) write to local files, or (c) execute local programs.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK untrusted applet/application privilege escalation (6661918)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3107" }, { "category": "external", "summary": "RHBZ#452658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=452658" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3107", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3107" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3107", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3107" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:18:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.1.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0636" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK untrusted applet/application privilege escalation (6661918)" }, { "cve": "CVE-2008-3111", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454605" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start Buffer overflow vulnerabilities (6557220)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3111" }, { "category": "external", "summary": "RHBZ#454605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454605" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3111", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3111" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:18:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.1.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0636" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start Buffer overflow vulnerabilities (6557220)" }, { "cve": "CVE-2008-3112", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454606" } ], "notes": [ { "category": "description", "text": "Directory traversal vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create arbitrary files via the writeManifest method in the CacheEntry class, aka CR 6703909.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start, arbitrary file creation (6703909)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3112" }, { "category": "external", "summary": "RHBZ#454606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454606" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3112", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3112" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:18:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.1.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0636" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start, arbitrary file creation (6703909)" }, { "cve": "CVE-2008-3113", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454607" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java Web Start in JDK and JRE 5.0 before Update 16 and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create or delete arbitrary files via an untrusted application, aka CR 6704077.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start arbitrary file creation/deletion file with user permissions (6704077)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3113" }, { "category": "external", "summary": "RHBZ#454607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454607" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3113", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3113" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:18:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.1.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0636" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start arbitrary file creation/deletion file with user permissions (6704077)" }, { "cve": "CVE-2008-3114", "discovery_date": "2008-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454608" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows context-dependent attackers to obtain sensitive information (the cache location) via an untrusted application, aka CR 6704074.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start, untrusted application may determine Cache Location (6704074)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3114" }, { "category": "external", "summary": "RHBZ#454608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454608" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3114", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3114" } ], "release_date": "2008-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:18:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.1.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.16-1jpp.2.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.16-1jpp.2.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0636" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Java Web Start, untrusted application may determine Cache Location (6704074)" } ] }
ghsa-984m-qj9q-3464
Vulnerability from github
Published
2022-05-01 23:56
Modified
2022-05-01 23:56
Details
Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.
{ "affected": [], "aliases": [ "CVE-2008-3111" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-07-09T23:41:00Z", "severity": "HIGH" }, "details": "Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.", "id": "GHSA-984m-qj9q-3464", "modified": "2022-05-01T23:56:44Z", "published": "2022-05-01T23:56:44Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3111" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43664" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10541" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=122331139823057\u0026w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/31010" }, { "type": "WEB", "url": "http://secunia.com/advisories/31055" }, { "type": "WEB", "url": "http://secunia.com/advisories/31320" }, { "type": "WEB", "url": "http://secunia.com/advisories/31497" }, { "type": "WEB", "url": "http://secunia.com/advisories/31600" }, { "type": "WEB", "url": "http://secunia.com/advisories/31736" }, { "type": "WEB", "url": "http://secunia.com/advisories/32018" }, { "type": "WEB", "url": "http://secunia.com/advisories/32179" }, { "type": "WEB", "url": "http://secunia.com/advisories/32180" }, { "type": "WEB", "url": "http://secunia.com/advisories/37386" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238905-1" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3178" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3179" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0595.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0790.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/494505/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/497041/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/30148" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1020452" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA08-193A.html" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0016.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/2056/references" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/2740" }, { "type": "WEB", "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-043" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2008-3111
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2008-3111", "description": "Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.", "id": "GSD-2008-3111", "references": [ "https://www.suse.com/security/cve/CVE-2008-3111.html", "https://access.redhat.com/errata/RHSA-2008:0790", "https://access.redhat.com/errata/RHSA-2008:0638", "https://access.redhat.com/errata/RHSA-2008:0636", "https://access.redhat.com/errata/RHSA-2008:0595" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2008-3111" ], "details": "Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.", "id": "GSD-2008-3111", "modified": "2023-12-13T01:23:05.111689Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3111", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2008-09-24", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html" }, { "name": "20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=122331139823057\u0026w=2" }, { "name": "31600", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31600" }, { "name": "SUSE-SA:2008:042", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html" }, { "name": "32018", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32018" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "32179", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32179" }, { "name": "ADV-2008-2740", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2740" }, { "name": "31320", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31320" }, { "name": "SUSE-SA:2008:043", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html" }, { "name": "sun-javawebstart-unspecified-bo(43664)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43664" }, { "name": "ADV-2008-2056", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2056/references" }, { "name": "238905", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238905-1" }, { "name": "31055", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31055" }, { "name": "32180", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32180" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0016.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0016.html" }, { "name": "31736", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31736" }, { "name": "oval:org.mitre.oval:def:10541", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10541" }, { "name": "http://support.apple.com/kb/HT3178", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3178" }, { "name": "1020452", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020452" }, { "name": "30148", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30148" }, { "name": "31497", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31497" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-08-043/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-043/" }, { "name": "20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and patches for ESX and ESXi resolve multiple security issues", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/497041/100/0/threaded" }, { "name": "20080717 ZDI-08-043: Sun Java Web Start vm args Stack Buffer Overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/494505/100/0/threaded" }, { "name": "SUSE-SA:2008:045", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html" }, { "name": "RHSA-2008:0790", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0790.html" }, { "name": "TA08-193A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-193A.html" }, { "name": "37386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37386" }, { "name": "http://support.apple.com/kb/HT3179", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3179" }, { "name": "RHSA-2008:0595", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0595.html" }, { "name": "31010", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31010" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3111" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" }, { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "238905", "refsource": "SUNALERT", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238905-1" }, { "name": "31010", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31010" }, { "name": "RHSA-2008:0595", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0595.html" }, { "name": "31600", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31600" }, { "name": "RHSA-2008:0790", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0790.html" }, { "name": "SUSE-SA:2008:043", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html" }, { "name": "31055", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31055" }, { "name": "SUSE-SA:2008:042", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-08-043/", "refsource": "MISC", "tags": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-043/" }, { "name": "30148", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/30148" }, { "name": "31497", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31497" }, { "name": "31320", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31320" }, { "name": "TA08-193A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-193A.html" }, { "name": "http://support.apple.com/kb/HT3179", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/kb/HT3179" }, { "name": "32018", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32018" }, { "name": "APPLE-SA-2008-09-24", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html" }, { "name": "SUSE-SA:2008:045", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html" }, { "name": "http://support.apple.com/kb/HT3178", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/kb/HT3178" }, { "name": "32180", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32180" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0016.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0016.html" }, { "name": "20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and", "refsource": "BUGTRAQ", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=122331139823057\u0026w=2" }, { "name": "32179", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32179" }, { "name": "1020452", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1020452" }, { "name": "GLSA-200911-02", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200911-02.xml" }, { "name": "37386", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37386" }, { "name": "ADV-2008-2056", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2056/references" }, { "name": "ADV-2008-2740", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2740" }, { "name": "31736", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/31736" }, { "name": "sun-javawebstart-unspecified-bo(43664)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43664" }, { "name": "oval:org.mitre.oval:def:10541", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10541" }, { "name": "20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and patches for ESX and ESXi resolve multiple security issues", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/497041/100/0/threaded" }, { "name": "20080717 ZDI-08-043: Sun Java Web Start vm args Stack Buffer Overflow", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/494505/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-30T16:26Z", "publishedDate": "2008-07-09T23:41Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.